Stronger / Multi-factor Authentication For Enterprise Applications (Identity Assurance using PKI, Smart cards and Biometrics)



Similar documents
Stronger Authentication with Biometric SSO

Biometric SSO Authentication Using Java Enterprise System

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Architecture & Design Strategies

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Enhancing Web Application Security

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Moving to Multi-factor Authentication. Kevin Unthank

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

A Method of Risk Assessment for Multi-Factor Authentication

Audio: This overview module contains an introduction, five lessons, and a conclusion.

API-Security Gateway Dirk Krafzig

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

French Justice Portal. Authentication methods and technologies. Page n 1

Adding Stronger Authentication to your Portal and Cloud Apps

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Multi Factor Authentication API

CoSign by ARX for PIV Cards

Swivel Multi-factor Authentication

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Identity & Privacy Protection

STRONGER AUTHENTICATION for CA SiteMinder

Implementing Identity Provider on Mobile Phone

nexus Hybrid Access Gateway

WHITE PAPER Usher Mobile Identity Platform

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September Trianz 2008 White Paper Page 1

Secure the Web: OpenSSO

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

CryptoNET: Security Management Protocols

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

The Convergence of IT Security and Physical Access Control

PortWise Access Management Suite

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

ADVANCE AUTHENTICATION TECHNIQUES

IDRBT Working Paper No. 11 Authentication factors for Internet banking

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Security Challenges. in Moving to Externalized Datacenters. (Focusing on SaaS) Eran Birk, Spring Business. Intelligence

Alternative authentication what does it really provide?

The increasing popularity of mobile devices is rapidly changing how and where we

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Introducing etoken. What is etoken?

Evaluation of different Open Source Identity management Systems

Introduction to SAML

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Chapter 15 User Authentication

CompTIA Security+ Certification SY0-301

Multi-Factor Authentication of Online Transactions

Towards an Open Identity Infrastructure with OpenSSO. RMLL Nantes July Fulup Ar Foll Master Architect

How CA Arcot Solutions Protect Against Internet Threats

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

JVA-122. Secure Java Web Development

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Vidder PrecisionAccess

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

Simplifying Security with Datakey Axis Single Sign-On. White Paper

OpenHRE Security Architecture. (DRAFT v0.5)

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

The Current and Future Direction of Identity Assurance. A critical foundation for identity and access management solutions

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Multi-Factor Authentication Core User Policy and Procedures

Multi-factor authentication

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Strong Authentication for Healthcare

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox

Leveraging SAML for Federated Single Sign-on:

The Convergence of IT Security and Physical Access Control

Digital identity: Toward more convenient, more secure online authentication

Introduction to Computer Security

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

solutions Biometrics integration

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Research Article. Research of network payment system based on multi-factor authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Authentication Levels. White Paper April 23, 2014

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century

E-Banking Regulatory Update

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Open Source Identity Integration with OpenSSO

White Paper PalmSecure truedentity

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

CS 356 Lecture 28 Internet Authentication. Spring 2013

Mid-Project Report August 14 th, Nils Dussart

PRIME IDENTITY MANAGEMENT CORE

5 Day Imprivata Certification Course Agenda

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Entrust IdentityGuard

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Microsoft vs. Red Hat. A Comparison of PKI Vendors

Transcription:

Stronger / Multi-factor Authentication For Enterprise Applications (Identity Assurance using PKI, Smart cards and Biometrics) Sun Virtualization Solutions Presented to OWASP Seminar, Hartford (Feb 10, 2009) Ramesh Nagappan Sun Microsystems, Burlington, MA http://www.coresecuritypatterns.com/blogs

Agenda The Identity Dilemma Identity Assurance vs. Stronger Security Multi-factor Authentication Strategies Understanding Real-world Implementation Tools of the Trade Role of JAAS Role of Sun OpenSSO Enterprise Architecture and Deployment Demonstration OTPs, Smartcards, PKI and Biometrics Choosing the credential: Pros and Cons Multi-factor SSO with PKI, Smart cards and Biometrics. Q&A

Who am I? A technical guy from Sun Microsystems, Burlington, MA. Focused on Security and Identity Management technologies Co-Author of 5 technology books and numerous articles on Java EE, XML Web Services and Security. Holds CISSP and CISA. Contributes to Java, XML security, Biometrics, Smart cards standards and open-source initiatives. Contributes to Graduate curriculum of Information Security programs at multiple universities. Ph.D drop-out. Read my blogs at http://www.coresecuritypatterns.com/blogs Write to me at nramesh@post.harvard.edu

The Identity Dilemma : Who Are You? Internet is a faceless channel of interaction. No mechanisms for physically verify a person who is accessing your resources. Identifying the legitimate user has become crucial. With higher strength of authentication Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61 and security. Mandates mechanisms driven by human recognition characteristics. Growing trends on on-demand SaaS, Cloud computing infrastructures. Everyone is concerned about their private information and privacy.

How do I know..it's you? Identity thefts and on-line frauds: The fastest growing crime in the world. Someone wrongfully obtains or abuses another person's identity for economic or personal gain. Impersonation, Counterfeits, stolen or forged credentials (PINs, Passwords, ID cards), Phishing are widely becoming common. Most frauds happens through trusted insiders. Fake credentials are everywhere : Few detected and many undetected! Identity thefts results huge losses to organizations. Loss of consumer confidence and leading to incur huge government penalties. Growing needs for stringent Personal Identity Verification and Assurance (i.e HSPD-12, ICAO 9303). Growing mandates for protecting Identity information and compliance (i.e. Massachusetts 201 CMR 17.00)

Growing need for Identity Assurance High degree of authentication and assurance is the most critical requirement for physical and logical access control. Acquire Identity credentials that tightly binds an event to a person's proof of possessions, physiological characteristics and behavioural traits. Identification and authentication as equivalent to Face-to-Face verification of a person. Credentials must provide at-least some long-term stability. Credentials should be non-intrusive but still qualitatively and quantitatively measured. Integrate/Interoperable with physical and logical infrastructures for assured identity verification. Support for pervasive use (On-demand SaaS and Cloud-computing based application infrastructures) for authenticating a person with irrefutable proof. Lesser impact on privacy and social values.

Human Factors of Identity Assurance Human attributes as Identity Assurance Credentials Proof-of-Knowledge Something I know? Passwords, PIN, Mom's Maiden Name, Phone #, etc. Proof-of-Possession Something I have? Smartcards, Tokens, Driver's license, PKI certificates Proof-of-Characteristics Something I physiologically or behaviorally own? Fingerprints, Hand geometry, Facial image, Iris, Retina, DNA, voice, signature patterns Proof-of-Physical Presence

Security Levels vs. Identity Assurance Courtesy: Randy Vanderhoof, Smartcard Alliance

Strong Authentication Strategies Authentication Questions HTTP/s Request/Response attributes Hardware/Software Token based One-time Passwords (OTP) Hardware/Software Token based Challenge/Response OTP Phone call based OTP SMS based OTP PKI Certificate USB Tokens/Smart cards (PIN and PKI Certificates) Biometrics (Fingerprints) USB Token/Smart cards (PKI and Match-on-card Biometrics).

One-Time Passwords Hardware/Software Tokens Generate one-time passwords Mathematical problem or Crypto function or Random number generation Challenge/Response Dynamic password, Asynchronous Password Time synchronization between client & server. Deliver Passwords Proprietary devices, USB, Key fobs SMS Messages, Email, Phone Known issues Vulnerable to MITM, Phishing attacks where Time-synchronization not effective. DES key and Lost token issues Standards: OAUTH (Open Authentication Initiative) One-Time Passwords : Alternative to static passwords

Smart cards w. PKI Smart cards Standards A credit card sized computing device acts as a Cryptographic token. Contact / Contactless cards ISO-7816 Allows perforning security functions Key generation Public/Private key operations PIN/Biometric authentication Challenge/response authentication Supports the use of Public-key infrastructure to verify the Identity claim. PKI credential issuance. Credential validation/verification via OCSP, CRLs Java Card, Multos Global Platform PC/SC FIPS-201/PIV, CAC PKCS#11, PKCS#15 GSM/PCS EMV (Europay/Mastercard/Visa) Defends against tampering and hacking. PKI/Private key protection Issues: Lost cards, Key compromise recovery is difficult. Smart cards as a Cryptographic Token

Biometric Assurance Biometric Identity Standards Use of Physiological or Behavioral characteristics to identify a person. High degree of assurance with proof of presence. Fingerprints, Facial image/geometry, Iris, Retina, Voice, Hand geometry, Keystroke, Signature INCITS 378 / CBEFF (Fingerprints) Biometric templates can be stored on Smart card for personal identification. Fingerprint template is ~200 bytes Iris template is 500 bytes JavaCard BioAPI INCITS 379 (Iris) OASIS BIAS BioAPI FIPS-201 / PIV Biometric credential must be exchanged in a secure network channel (Trusted path) Issues: Biometrics is not a secret False Acceptance (FAR) & False Reject (FRR) rates Vulnerable to Message replay/mitm attacks, if not exchanged in secure channel. Biometric Assurance : Who I claim to be

Real-world Scenario : Authentication Identity Assurance Credentials Authentication Server / Directory User name, password One-time Passwords Smart Card (PKI Certificates) Enterprise Applications Biometrics Validate Good Bad Ideally, credentials are: something you know + something you have + something you are

Real World Scenario : SSO / Federation IDP/SSO Server + Directory Multi-factor Identity Credentials (e.g. username/password, Smartcard PKI, Biometrics) Application A Application B 1. 2. 3. SSO Token SAML Artifact Acquire Credentials Proprietary token Kerberos ticket etc

Tools of the Trade : What do you need? Multi-factor Authentication for Enterprise Applications Web Authentication JAAS Login Module Desktop Authentication PAM Module (Solaris, Linux) GINA (Windows XP, 2003) Identity Provider Infrastructure (IDP) Single Sign-on (SSO) Multi-factor authentication Directory Server Repository for user accounts Your target applications

Tools of the Trade : From Authentication Providers Multi-factor Authentication for Enterprise Applications Browser Plugin PKCS#11 Client for Smartcard ActiveX/Java Plugin for USB Biometric Scanners Enrollment Middleware Biometric Enrollment, Smartcard/Token Credential Issuance/Management One-time Password (Token) registration/issuance Authentication Middleware Biometric Authentication, One-time password authentication PKI Credential validation via OCSP, CRL, Directory, Certificate Authority

Java Authentication Authorization Service (JAAS) JAAS plays a vital role delivering Multi-factor authentication. All Java EE compliant Application server provide support for JAAS. JAAS allows to enable Multi-factor authentication in Java EE Enterprise environment. Facilitates pluggable authentication providers as Login Modules. Ensure Java EE remain independent of authentication providers. Implementing a Login module is not cumbersome.. Callback handler Prompt the user for acquiring credentials Login (), commit (), Logout () Choose your own JAAS based Identity Provider Infrastructure? Get introduced to Sun OpenSSO

Sun OpenSSO Enterprise Identity Services Infrastructure facilitates Single Sign-On (SSO) for Web applications residing within an enterprise or across networks. Based on Sun's Open-source initiative. Open standards based framework supports centralized authentication, authorization and auditing. JAAS based authentication services Agent-based and XACML based policy enforcement Identity-enabled XML Web services for AuthN, AuthX, Audit and Provisioning Identity Federation Protocols support include SAMLv2, ID-*, WS-Federation,WSPolicy) XML Web Services Security (WS-Security, WS-Trust, WS-I Basic Security Profile) Multi-factor authentication via chaining Centralized configuration, logging and auditing services Supports multiple Java EE application servers and Web containers Fedlets Deployed as a Web application (single WAR file)

Multi-factor Authentication and Session Upgrade OpenSSO Authentication Chain and Session upgrade thru AuthN OpenSSO facilitates stronger/ multi-factor authentication through authentication chain including multiple authentication providers. Enables an authentication process where an user must pass credentials to one or more authentication modules before session validation. Session validation is determined based on the JAAS control flag (Required, Requisite, Sufficient, Optional) configured to the authentication module instance chain. The overall authentication success or failure is determined based on the control flag assigned to each module in the authentication stack. OpenSSO is tested and verified to provide multi-factor authentication chain that include BiObex Login, Smartcard/PKI and other OpenSSO supported authentication providers. Session Upgrade allows upgrading a valid session based on a successful second-factor authentication performed by the same user. Allows user authenticate to access second resource under the same or different realm If authentication is successful - OpenSSO updates the session based on the secondlevel authentication. If authentication fails, the current session will be maintained.

OpenSSO Policy Agents Authorization and Policy Enforcement Policies are managed by Policy Configuration Service in OpenSSO. Policy service authorizes a use based on the policies stored in OpenSSO. Policy consists of Rules, Subjects, Conditions and Response providers. OpenSSO Policy Agents enforce policy and Policy decisions on protected resources. Intercepts the requests from user clients and applications and redirects them to OpenSSO server for authentication If no SSO token exists. Once authenticated, the policy agent communicates with OpenSSO Policy service to grant/deny access to the user based on policy evaluation.

Multi-factor Authentication w. Biometrics

Multi-factor Authentication Smartcard/PIN/PKI and Biometrics

Deployment Architecture

Participate in OpenSSO Community! Join 700 project members at opensso.org Join Sign up at opensso.org Download OpenSSO Enterprise 8 Subscribe OpenSSO Mailing Lists dev, users, announce Chat #opensso on freenode.net Sun Confidential: Partners and Customers NDA/CDA only

Demonstration... Thank You Sun Virtualization Solutions Ramesh Nagappan Sun Microsystems, Burlington, MA http://www.coresecuritypatterns.com/blogs