Effective use of Digital Identities and ID cards in a Government Environment



Similar documents
OECD workshop on digital identity management BELGIAN approach

Like passports, intended for use in public (G2C) and private (B2B, B2C) domain. Though expected to be used mostly in private domain (by some of us)

IAM Application Integration Guide

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Identity Management and eid Integration

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Context based identity management: a reality and necessity for online and cloud services

eid Security Frank Cornelis Architect eid fedict All rights reserved

Server based signature service. Overview

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

Smart Card Setup Guide

The Belgian e-id: hacker vs developer

Entrust IdentityGuard Comprehensive

Federation Proxy for Cross Domain Identity Federation

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Pick an Identity and Access Management Standard, Any

Agenda. How to configure

Configuring User Identification via Active Directory

eauthentication in Estonia and beyond Tarvi Martens SK

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict All rights reserved

Egyptian Best Practices Securing E-Services

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Biometric Single Sign-on using SAML

The Unique Alternative to the Big Four. Identity and Access Management

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

SAM Context-Based Authentication Using Juniper SA Integration Guide

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

CommIT: Simplifying Admissions Identity Management

Identity Management for Interoperable Health Information Exchanges

Biometric Single Sign-on using SAML Architecture & Design Strategies

Government CA Government AA. Certification Practice Statement

SURFnet Dashboard. Concept, Impressions and ideas. High quality internet for higher Education and Research

Biometric SSO Authentication Using Java Enterprise System

Interoperable Provisioning in a Distributed World

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Public Key Infrastructure for a Higher Education Environment

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist

Securing Enterprise: Employability and HR

1.6 HOW-TO GUIDELINES

Digital Signature Service. e-contract.be BVBA 2 september 2015

TIBCO Spotfire Platform IT Brief

> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional

HIGHSEC eid App Administration User Manual

OIOIDWS for Healthcare Token Profile for Authentication Tokens

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

SAML SSO Configuration

Entitlements Access Management for Software Developers

APPLICATION ACCESS MANAGEMENT (AAM) Augment, Offload and Consolidate Access Control

Microsoft Windows Server 2003 Integration Guide

An Introduction to SCIM: System for Cross-Domain Identity Management

VMware Identity Manager Integration with Active Directory Federation Services 2.0

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

TrustedX: eidas Platform

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Identity Management Requirements

2013 AWS Worldwide Public Sector Summit Washington, D.C.

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Proposed Framework for an Interoperable Electronic Identity Management System

SERVER CERTIFICATES OF THE VETUMA SERVICE

Landscape of eid in Europe in 2013

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

ADFS Integration Guidelines

Microsoft vs. Red Hat. A Comparison of PKI Vendors

CERN, Information Technology Department

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Red Hat Identity Management

Copyright

Instructions for Using Secure . (SMail) via Outlook Web Access. with an RSA Token

Web Based Single Sign-On and Access Control

Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada

Single Sign On In A CORBA-Based

Single Sign On. SSO & ID Management for Web and Mobile Applications

Identity Management Overview. Bill Nelson Vice President of Professional Services

SAFE Digital Signatures in PDF

The role of authentication and eid interoperability in the access to scientific databases

Implementation: Single European Market for eidentity

Use Enterprise SSO as the Credential Server for Protected Sites

Active Directory Integration

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

SERVER CERTIFICATES OF THE VETUMA SERVICE

Protect Everything: Networks, Applications and Cloud Services

Corporate Security & Identity

CS 356 Lecture 28 Internet Authentication. Spring 2013

esign Online Digital Signature Service

RealMe. Technology Solution Overview. Version 1.0 Final September Authors: Mick Clarke & Steffen Sorensen

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

OpenHRE Security Architecture. (DRAFT v0.5)

FedICT. Carte d identité électronique (BELPIC) egovernment. Architecture et stratégie. E-government. Simplification administrative

Identity and Access Management Policy

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

Identity Assurance Framework

Getting Started with AD/LDAP SSO

OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - spn@itst.dk

How To Use Saml 2.0 Single Sign On With Qualysguard

Transcription:

Effective use of Digital Identities and ID cards in a Government Environment Bavo De Ridder Principal Information Security Consultant Competence Leader IAM Erik R. van Zuuren Principal Information Security Consultant BU Director Architectures 1

Disclaimers Part of this presentation reflects the personal vision of the speakers. Part of this presentation represents the architectural vision of MVG-SCICT as is being implemented at this time. All of the content is based either on public information or is based on declassified MVG-SCICT -information (and is being communicated with the consent of MVG-SCICT ). With gratitude to Luc Chauvin / Wim Martens, MVG-SCICT 2

Belgium At the heart of Europe Home to the EU Home to NATO Source: www.belgium.be 3

Agenda Authentication Belgian eid Introduction to Belgian eid Card Access Control & Authorization Typical scenarios and requirements Identity Management Roles, mandates, management Logging & Auditing Responsibilities 4

Authentication - Belgian eid Card 5

eid Project Goals Replace existing eid-cards (identification of all inhabitants age 12 of more: names, place of birth, birthdate, unique registration-number, ) Enable e-communications with government (certs for authentication and digital signature) Source: FOD BZ 6

Bull Belgian eid Card Government - the national eid-card: Communities, the National Registry, Private Partners. VRK (4) CM/CP/CI (7) (5) (10a1) (3) RC (10a2) (6) Meikäläinen Matti (9) CA CA (8) PIN & PUK1 -code ERA (10b) (1) De Gemeenten Face to face identification (2), (12) (11) Source: Fedict (13) - For Techies: validation via CRL s and OCSP 7

Other Projects Intermediate solution Federal Token Startup issues of the eid Readers / Middleware / For Techies: authentication via SAML1.0 POST-profile Source: www.belgium.be 8

Other Projects Kids Card < 12 years Voluntary Potential 1.3 million cards Source: Fedict Foreigner Card EU and non-eu Potential 1 million cards Source: Fedict 9

Access Control And Authorization 10

Typical Access Control Use Case: Resource needs to be protected John Doe wants access Access Control Environment: Identifies John Doe Authorizes John Doe 11

Identification Requires knowledge of the subject Username Unique ID Requires a mechanism of proof Passwords? Token? Trusted Provider? Trusted Issuer? Identity Repository LDAP, Active Directory TrustedSources? 12

Authorization Sometimes requires knowledge of the subject: Department Function Sometimes requires other info: Contextual Environment Trusted Sources of roles, atttibutes,? Trusted Sources of eg mandates? 13

Government Case 14

Government Case (2) Government Organization Small number of large and independent agencies Large number of small and dependent agencies Access Control Infrastructure Expensive for most agencies ASP Model Share knowledge and infrastructure 15

Example Flemish Gov BUITEN MVG reverse proxy server web server informatie Authenticatie- en Identificatie- Diensten 6. Indien authenticatie OK, ontvang identiteitsgegevens: rijksregisternummer (RRN) (1) Vlaamse portaal applicatie Vlaamse overheidswebsites (8) web server informatie applicatie 5. Verzend authenticatiegegevens ACM (2) gebruikersnaam + paswoord toegangs beheer (7) 2. Authenticeer gebruiker op veiligheidsniveau X (3) (6) identiteits beheer authentificatie & identificatie BINNEN MVG (5) (4) federale authenticatieen identiteitsgegevens federale token ACM federale eid BUITEN MVG reverse proxy server web server informatie applicatie (1) Eigen portaal e od eth erm nd tice ke en lf be h t e u in s a k uz ns Kie aa ve 3. n m ge e ge atie ic nt the au ef Ge 4. (8) web server informatie applicatie (2) Vlaamse portaal 1. Log in op website om toegang te krijgen tot Informatie of dienst 8. Komt u maar binnen 9. Toegang 7. Heb gebruiker geauthenticeerd, dit zijn zijn/haar identiteitsgegevens (7) ACM toegangs beheer (3) (6) authentificatie & identificatie identiteits beheer BINNEN MVG (4) (5) federale authenticatieen identiteitsgegevens 16

Example - InterGov PDP-SZ PDP-FGOV PDP-VO (SM) PDP-LIJN Policy Enforcement Points Policy Decision Points 17

Identity Management 18

Identity Sources 19

Identity Targets 20

Challenges Strong diversity in identities Citizens, civil servants, nurses Changes in Sources and Targets In numbers and technology Different Administration Models Central, delegated (flavors!) Real World Support Smaller agencies, political issues 21

Requirements Stable Platform Adding user types Adding sources Adding targets Maximal re-use of Components Flexible New administration models Federation, ID-WSF, SPML 22

Flemish ASP Model 23

ASP Proces Model 24

Flemish ASP Model Abstraction Import and Administration Consolidation and Unification Synchronisation and Provisioning Out Sourcing At Each Level Keep your own IdP but out source administration Out source IdP and administration Keep your own IdP and administration 25

Conclusion 26

Conclusion Government Context Some unique challenges Reality check (small agencies, politics ) ASP Model Requirements Offer rich environment Offer choice at different levels Identity Standards Very useful but not sufficient Use them as soon as possible 27

Questions? http://www.ascure.com bdr@ascure.com ezu@ascure.com 28

Thank You 29