Securing Identities & Trust



Similar documents
TrustedX: eidas Platform

TrustedX - PKI Authentication. Whitepaper

Agenda. How to configure

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

How To Create A Global Signer For The Internet Of Everything

DS : Trust eservices. The policy context: eidas Regulation

Frans Bolk CEO UniQ-ID

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

NIST-Workshop 10 & 11 April 2013

Securing ArcGIS Server Services: First Steps

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

NCSU SSO. Case Study

CoSign Digital Signatures and Alfresco at ERT. VP, EMEA Sales CoSign by ARX

IAS2. ets Market analysis

VASCO: Compliant Digital Identity Protection for Healthcare

Copyright: WhosOnLocation Limited

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

esign Online Digital Signature Service

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Applying Cryptography as a Service to Mobile Applications

IT Governance: The benefits of an Information Security Management System

Ericsson Mobile digital identity

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Connecting Users with Identity as a Service

Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

CERTIFICATION PRACTICE STATEMENT UPDATE

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Introduction to SAML

Security Best Practices for Microsoft Azure Applications

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobile Security. Policies, Standards, Frameworks, Guidelines

Portal for ArcGIS: An Introduction

Digital Signatures The Law and Best Practices for Compliance. January 2014

Secure Your Enterprise with Usher Mobile Identity

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Identity Relationship and Access Management for the Extended Enterprise

QuoVadis Group. EUGridPMA Update September 2014

January 2015 Copyright 2015 GSM Association

Connected Data. Connected Data requirements for SSO

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Securing Cloud Computing. Szabolcs Gyorfi Sales manager CEE, CIS & MEA

ComSignTrust e-signing Solutions

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Digital Signatures for SharePoint

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Building Secure Applications. James Tedrick

Ernesto Ongaro BI Consultant February 19, The 5 Levels of Embedded BI

Best prac*ces in Cer*fying and Signing PDFs

eid/authentication/digital signatures in Denmark

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Can We Reconstruct How Identity is Managed on the Internet?

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Making Digital Signatures Work across National Borders

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

Secured Signing for Documents

Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Enhancing Web Application Security

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

SSLPost Electronic Document Signing

Centrify Cloud Connector Deployment Guide

Configuring Salesforce

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

COMMISSION OF THE EUROPEAN COMMUNITIES

SAML SSO Configuration

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

PKI - current and future

Quality Authenticator Scheme

Frost & Sullivan. Publisher Sample

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

D . A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information:

goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services

API-Security Gateway Dirk Krafzig

Transcription:

Securing Identities & Trust

Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2

About Safelayer Providing ID technologies for: Multi-factor Authentication PKI Authentication Digital Signature Since 1999 Offices in Madrid & Barcelona R&D in Europe WWW.SAFELAYER.COM 3

Providing ID Technologies for strong authentication, identity federation and digital signature management solutions REFERENCES CUSTOMERS 21 VAR s EMEA & LATAM R&D and INNOVATION Citizen identification nationwide projects: ecards and epassports, Estonia, Panama, Paraguay, Spain, Uruguay Over 20 global and regional financial institutions Large deployment of PKI infrastructures, electronic signatures, adaptive authentication, data encryption Local integration services and Competency Centers in 13 countries in EMEA & LATAM through Systems Integrators and Consultancy firms Alliance with leading technology Partners. OEM with ISV and Technology Transfer Common Criteria EAL 4+ ETSI CAdES/XAdES Interoperability Tests The TeleTrusT Innovation Award WWW.SAFELAYER.COM 4

Agenda About Safelayer eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q & A? WWW.SAFELAYER.COM 5

Identifiers and Trust Levels Trust elevation Trust elevation LoA-4 LoA-1 LoA-3 LoA-2 Trust elevation Trust elevation National Institute of Standards and Technology (NIST) ITU-T X.1254 / ISO/IEC 29115 classifications WWW.SAFELAYER.COM 6

The User is the Center User-centric technologies WWW.SAFELAYER.COM 7

Ambitions Convenience & Trust How shall we handle the whole set of elements and rules of this «wider» game? Which are the Key Factors we should be able to handle? WWW.SAFELAYER.COM 8

So We need to able to Move «Authentication Complexity» from Relying Parties or Services Providers to Corportate Indetity Provider with Adapatative capabilitues Orchestrate Authentication Mechanims Trust Management Elevation Authentication Workflow Authentication Policy Authentication Mechanims Contextual Policy Securiy Rislk & LoA Contextual Analysis for Buisness Mision Authorithation Workflow Policy Driven Technology Authorzation Policy Integate Mechanims in «Scope» Context Securiy Rislk & LoA WWW.SAFELAYER.COM 9

TrustedX eidas WWW.SAFELAYER.COM 10

Back-end: eidas Platform & Trust Service Provider Your branded Mobile ID App eidas services orchestration Identity Federation Web SSO API / SDK Digital Certificates Certification Authority Identity provider (IdP) esignature provider (esigp) Integration standards Time Stamping Authority Validation Authority Certification Authority LDAP Server Trust Services Platform Registration Authority Trust Service Provider 11

Safelayer eidas Platform Integration CLOUD Mobile 12

Europe: eidas Ambitions 2018 Mandatory recognition of eids eid cross-border interoperability Digital Signature in Europe 2015 Voluntary recognition of eids 2014 Entry into force of the Regulation 2016 Date of application of rules for Trust Services Regulation (EU) N 910/2014 on electronic identification and trust services for electronic transactions in the internal market (eidas Regulation) http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/en/trans/144112.pdf Source: http://ec.europa.eu/digital-agenda/en/trust-services-and-eid 13

Agenda About Safelayer eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Speakers WWW.SAFELAYER.COM 14

About Izenpe Provides identification and electronic signature services Major trust service provider in Spain WebTrust and ETSI TS 101456 / 102 042 certified 15

eidas implementation at Izenpe New identification, SSO and federation service Identification Signature service adapted to mobile or server Signature Izenpe recognizes and verifies government and social credentials Izenpe provides its own credentials that can be used alongside previous ones 16

Izenpe Mobile App Mechanism for managing the Izenpe digital certificates on the citizen/user's mobile Invoked in the mobile's Apps/Browser or from other devices for authenticating and/or signing. Use is prompted for when the Identification service requires a high level of security. 17

Agenda About Safelayer eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Speakers WWW.SAFELAYER.COM 18

Safelayer Demo Portal Safelayer on-line demo: http://demo.safelayer.com WWW.SAFELAYER.COM 19

Safelayer Demo Portal Try it by yourself! 20

Agenda About Safelayer eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q & A? WWW.SAFELAYER.COM 21

Thank you: E. Crespo <enrique.crespo@safelayer.com> J. Buch <jbt@safelayer.com> www.safelayer.com +34 917 080 480 1999-2015 Safelayer Secure Communications, S.A. All Rights Reserved. This material is intellectual property of Safelayer Secure Communications S.A. This material may be used or copied only in accordance with Safelayer.