Enable Your Applications for CAC and PIV Smart Cards



Similar documents
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

PingFederate. SSO Integration Overview

Connecting Users with Identity as a Service

CA Single Sign-On Migration Guide

PingFederate. Integration Overview

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

Identity. Provide. ...to Office 365 & Beyond

Flexible Identity Federation

Pick Your Identity Bridge

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

white paper 5 Steps to Secure Internet SSO Overview

How to Extend Identity Security to Your APIs

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

SAML SSO Configuration

The Role of Identity Enabled Web Services in Cloud Computing

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

Extend and Enhance AD FS

A Standards-based Mobile Application IdM Architecture

Agenda. How to configure

The Primer: Nuts and Bolts of Federated Identity Management

SAML-Based SSO Solution

The Top 5 Federated Single Sign-On Scenarios

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

OpenID Connect 1.0 for Enterprise

Identity Implementation Guide

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Interoperate in Cloud with Federation

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

CA CloudMinder. Getting Started with SSO 1.5

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

Customer Identity and Access Management (CIAM) Buyer s Guide

SAML-Based SSO Solution

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How To Manage A Plethora Of Identities In A Cloud System (Saas)

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

DEPARTMENTAL REGULATION

Federated Identity and Single Sign-On using CA API Gateway

Cloud SSO and Federated Identity Management Solutions and Services

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Introduction to SAML

API-Security Gateway Dirk Krafzig

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Google Apps Deployment Guide

The increasing popularity of mobile devices is rapidly changing how and where we

Simple Cloud Identity Management (SCIM)

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

IBM Tivoli Federated Identity Manager

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

How to Get to Single Sign-On

Flexible Identity Federation

STRONGER AUTHENTICATION for CA SiteMinder

An Overview of Samsung KNOX Active Directory-based Single Sign-On

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Single Sign On. SSO & ID Management for Web and Mobile Applications

NCSU SSO. Case Study

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Identity in the Cloud

USING FEDERATED AUTHENTICATION WITH M-FILES

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

The Challenges of Web single sign-on

HOL9449 Access Management: Secure web, mobile and cloud access

Access Management Analysis of some available solutions

NetworkingPS Federated Identity Solution Solutions Overview

CoSign by ARX for PIV Cards

Using SAML for Single Sign-On in the SOA Software Platform

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Increase the Security of Your Box Account With Single Sign-On

SAML 101. Executive Overview WHITE PAPER

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Internet Information Services Integration Kit. Version 2.4. User Guide

managing SSO with shared credentials

How To Use Salesforce Identity Features

Getting Started with AD/LDAP SSO

White paper Contents

Adding Stronger Authentication to your Portal and Cloud Apps

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

CA SiteMinder SSO Agents for ERP Systems

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

The Primer: Nuts and Bolts of Federated Identity Management

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

Securing Web Services From Encryption to a Web Service Security Infrastructure

TrustedX - PKI Authentication. Whitepaper

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

How to Implement Enterprise SAML SSO

HP Software as a Service. Federated SSO Guide

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

Transcription:

Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and contractors wear their identity around their neck. While most agencies are leveraging these for physical access, the challenge comes in trying to use them for logical access to systems. Today users still use multiple accounts and passwords to access systems. Ping Identity s solutions allow end users to use their PIV cards for seamless access to on-premise, hosted and cloud-based applications. This paper describes how agencies can leverage the card that hangs around user necks to be the key all applications.

Table of Contents Executive Summary... Deliver the Value of Smart Cards...3 OMB M--: Take HSPD-2 One Step Farther.... 3 Realizing the Promise of Smart Cards... 3 CAC and PIV Integration Challenges....4 Government Infrastructures Complicate Smart-Card Integration... 4 Complex Behind-the-Scenes Functionality... 5 Commercial Off-the-Shelf (COTS) Solutions....5 What to Look for in a COTS Solution... 5 Why Choose PingFederate for Your COTS Solution... 6 Taking a Closer Look at PingFederate...7 How PingFederate Works... 7 00% Adherence to Open Standards... 8 How the X.509 Integration Kit Works... 8 How Service Provider Integration Works... 9 Citrix XenApp Integration Kit... 9 CA SiteMinder Integration Kit... 9 SaaS Connectors... 0 Identity-Enabled Web Services... 0 Putting It All Together...0 Meeting OMB M-- Today and Tomorrow.... About Ping Identity... 2

HSPD-2 HSPD-2 calls for a mandatory, government-wide standard for secure and reliable forms of ID issued by the federal government to its employees and employees of federal contractors for access to federally-controlled facilities and networks. Deliver the Value of Smart Cards OMB M--: Take HSPD-2 One Step Farther In 20, the U.S. Government s Office of Management and Budget (OMB) sent an explicit directive to all federal agencies: Now that most government workers and contractors possess an X.509 smart card (CAC, PIV or PIV-I), step up your efforts to enable its use for accessing facilities and IT resources or risk losing funding. For government IT and security professionals, the stakes are high. The memorandum, known as OMB M--, mandates that funding for the development and maintenance of systems and resources new or existing is contingent on smart-card integration. With the stakes so high, now is the time to Understand why enabling applications to be smart-card compliant doesn t have to be difficult, expensive and time-consuming Learn how commercial off-the-shelf (COTS) solutions provide easy-to-implement, costeffective ways to address OMB M-- requirements Discover how PingFederate can help you meet the challenges of smart-card integration Realizing the Promise of Smart Cards The U.S. government s investment in X.509 smartcard technology is longstanding and considerable. The Department of Defense first deployed Common Access Cards (CACs) a decade ago. In 2004, Personal Identity Verification (PIV) and PIV-Interoperable (PIV-I) cards became a government-wide regulation with Homeland Security Presidential Directive 2 (HSPD-2), which called for multifactor authentication, digital signatures, encryption capabilities and a standardized background check for every government employee and contractor. Distributing PIV smart cards to employees and PIV-I smart cards to contractors across all federal agencies was the first step, but now attention has shifted to integrating applications into the PIV authentication infrastructure. With the huge variety of applications and architectures in use by government workers, creating agency-wide smartcard compatibility is a significant task. But to realize the promise of smart cards greater security, convenience and cost-savings enabling applications to accept PIV credentials is a necessity. 3

ICAM Segment Architecture The ICAM segment architecture provides a comprehensive approach to identity, credential and access management. CAC and PIV Integration Challenges Government Infrastructures Complicate Smart-Card Integration The need to provide access to a diverse set of applications complicates smart-card integration for many federal agencies, including the DoD, intelligence community and civilian agencies. Virtualized Client/Server Applciations WAM-protected Applications Cloud-based Applications Web Services Government Workforce It s not unusual for a government worker to need access to Virtualized client/server applications via a Web browser Web Access Management (WAM) protected applications (e.g., CA SiteMinder, IBM Tivoli) Cloud-based applications (e.g., Google Concur, salesforce.com) Information-sharing applications that call identity-enabled Web services Other legacy government applications or systems Developing custom code to ready even one application for smart-card authentication is no small feat. For most government agencies, the quantity of resources people, time, money needed to meet smart-card compliance seems staggering. Fortunately, a variety of commercial off-the-shelf (COTS) products and technologies are available to help agencies meet the requirements of OMB M--. An agency needs to carefully weigh the costs and benefits of a COTS solution vs. custom development to determine which option best meets the needs of the agency. 4

FICAM Roadmap The Federal ICAM Roadmap and Implementation Guidance outlines the strategic vision for ICAM efforts and the steps for implementing the ICAM segment architecture. Complex Behind-the-Scenes Functionality To understand the challenges of enabling an application to accept smart-card credentials, consider the e-authentication model that NIST recommends in the NIST Special Publication 800-63 Electronic Authentication Guideline. Government Agency PIV or CAC Authentication Credential Service Provider (CSP) SaaS Apps SAML configured for IdP and SP Roles On-premise Apps The left side of the diagram shows the steps required to set up smart-card authentication for a government worker. The worker registers () with a registration authority (RA). The RA vets the worker (2) and sends a registration confirmation (3) to a credential service provider (CSP). In turn, the CSP issues an identity token and credential (4) to be used for subsequent authentication events (e.g., accessing an application). The CSP maintains the credential; the worker maintains the smart card, which stores the token. The right side of the diagram shows the steps that must occur when the worker uses the smart card for authentication. The worker proves to a verifier that he or she possesses and controls the token through an authentication protocol exchange (A). The verifier interacts with the CSP (B) to validate the token and credential associated with the worker. The verifier then issues an identity assertion about the worker to the relying party (e.g., an application C). The relying party establishes an authenticated session with the worker (D). The workhorse in the NIST model is the verifier. Deploying a COTS solution that can fulfill the role of the verifier for a broad spectrum of applications can help you rapidly enable your agency applications to accept PIV credentials. Commercial Off-the-Shelf (COTS) Solutions What to Look for in a COTS Solution While the government does not require an agency to purchase a COTS solution or solution 5

PingFederate Highlights suite, agencies that consider this option need to answer several questions before deciding to purchase: How successfully will the product help us meet our service goals? Leverages agency investment in smart cards Meets mandates and requirements for funding Integrates today s onpremise and tomorrow s cloud applications Deploys rapidly How will the product integrate with our existing infrastructure? Is software licensing (or other cost-saving options) available? Does the solution use proprietary technology or is it based on open standards? With an eye on future needs, how adaptable is the solution? Does the solution support government initiatives and policies? Integrating an IT resource into the CAC and PIV authentication infrastructure can vary from simple to complex, depending on the type of resource, its age and ability to be updated, and the diversity of its user base. For example, transitioning some legacy applications might take months or more to complete and require extensive and costly custom development. So, it s important to make sure any COTS solution that you consider is robust enough so that you can enable most (if not all) of your agency resources simply, rapidly and cost-effectively. Why Choose PingFederate for Your COTS Solution PingFederate provides secure single sign-on (SSO) access to multiple applications and application architectures to all the types of applications a government worker typically uses. Working behind the scenes in the role of the verifier, PingFederate can conduct CAC or PIV user authentication exchange, validate the certificate with the credential service provider and securely pass the necessary identity information to the desired application to establish an authenticated session with the user. Government Agency SaaS Apps PIV or CAC Authentication Credential Service Provider (CSP) SAML configured for IdP and SP Roles On-premise Apps 6

PingFederate Cloud identity management platform for cloud single sign-on (SSO), automated cloud user provisioning and API security. Built on open standards and security technologies such as HTTP, HTTPS, SSL, TLS, SAML and PKI, PingFederate is designed specifically to help extend existing applications and its robust. Commercial integration kits support all leading identity management vendors and applications to enable rapid deployment into your existing infrastructure. The solution offers an SDK so that you can create custom adapters for systems that do not have an integration kit. PingFederate works with more than 200 SaaS partners out of the box. In addition to its core federated identity and SAML-based SSO capabilities, PingFederate also enables secure mobile access, automated cloud user provisioning and API security. Taking a Closer Look at PingFederate How PingFederate Works PingFederate is standalone, enterprise software. It provides an administration console and management services, runtime services and extensive logging and monitoring capabilities. But the most significant PingFederate feature and the reason WHY you can implement the software in days in most government environments is the rich set of integration capabilities that comes with the product. Administration Console Management Services Integration Kits SaaS Connectors Cloud Identity Connectors Token Translators CloudDesktop Cloud Single Cloud Sign-On Single & Federated Sign-On Identity Secure Mobile Access Automated Cloud User Provisioning API Security Runtime Services Logging & Monitoring PingFederate provides turnkey integration kits for more than 30 identity and application infrastructures. For CAC and PIV smart card integration, you use the X.509 integration kit, but PingFederate provides integration kits for Microsoft AD, CA SiteMinder, LDAP and many other identity provider environments, as well as an SDK for agentless integration. On the service provider side, PingFederate integrates with Java,.NET and PHP application environments; Web and application servers such as Apache or Microsoft IIS; WAM systems such as CA SiteMinder, Oracle OAM and IBM TAM; and commercial applications such as Citrix and Microsoft SharePoint. 7

PingFederate X.509 Certificate Integration Kit First Mile The Cloud Last Mile Certification provides an identity Identity Provider Service Provider provider (IdP) adapter that lets a PingFederate IdP server perform X.509 certificate authentication for SSO to service provider applications. Identity Mgmt. Systems Oracle OAM, IBM TAM, Active Directory, LDAP, Windows IWA Strong Auth Symantec VIP, RSA SecureID, RSA Adaptive Authentication, PhoneFactor, X.509 Custom Apps Java,.NET, PHP, Agentless Employees Browser 2 3 SAML OAuth OpenID WS-Trust WS-Federation Custom Apps Java,.NET, PHP, Agentless Web & App Servers Apache, Microsoft IIS, SAP NetWeaver, WebLogic, WebSphere Identity Mgmt. Systems Oracle OAM IBM TAM Commercial Apps Citrix SharePoint Firewall 00% Adherence to Open Standards PingFederate provides integrated support for all predominant open communications standards SAML, OAuth, OpenID, WS-Trust and WS-Federation to meet the needs of a wide range of government environments. SAML, an XML-based standard for communicating identity information between organizations, is the most accepted protocol for communicating identities across the Internet. Because of PingFederate s SAML-based capabilities, more than 200 partners have teamed with Ping Identity to deliver Tier SSO solutions. How the X.509 Integration Kit Works Consider a typical scenario in which a government worker logs on with a CAC or PIV smart card then requests an application through a Web portal. The X.509 integration kit, which installs with PingFederate, lets PingFederate acquire the user s certificate directly from the Web browser via SSL () The Cloud Next, PingFederate authenticates and validates Enterprise the certificate (2). Finally, PingFederate bundles up Certificate Manager SAML OAuth OpenID WS-Trust WS-Federation 3 all the user attributes from the certificate and other sources (e.g., a directory) into a secure SAML Employees Browser x.509 assertion and sends it to Firewall the requested application, authenticating the user (3). 8

How Service Provider Integration Works In the service provider role, PingFederate receives and decodes the security token. The various integration kits then enable the target application to consume the user information and use it to set up a valid session or other security context for the user. Citrix XenApp Integration Kit For example, consider what happens with the Citrix XenApp (a virtualized client/server application) integration kit. SAML 2 Plugin Service Provider Once the SAML assertion arrives, PingFederate uses an IIS server to generate an XenApp equivalent Kerberos ticket. XenApp uses the Kerberos ticket to authenticate the user and establish a user session. CA SiteMinder Integration Kit The PingFederate SiteMinder (a WAMprotected application) Service Provider integration kit works SAML Plugin differently. In this case, 2 once the SAML assertion arrives (), PingFederate instructs SiteMinder Policy Server to generate an SiteMinder SMSESSION cookie (2). PingFederate then redirects the user to the application where the SiteMinder Web Agent extracts and validates the SMSESSION cookie (3). 9

HSPD-2 Credentials Through 9//20 Employees: 4,270,560 (9%) Contractors: 846,365 (8%) Total: 5,6,925 (89%) IDManagement.gov http://www.idmanagement.gov SaaS Connectors The connectors supporting Google and other SaaS applications take advantage of the fact that these applications support SAML natively. In this case, PingFederate is involved only on the identity provider side. When a government worker logs on with a CAC or PIV card then clicks a link for Google Apps or Gmail in the Web portal, the link redirects the user to PingFederate (), which validates the user identity (2). PingFederate sends a SAML assertion directly Identity Provider The Cloud Directory Employees Browser SAML apps Provisioning Plugin Firewall to the Google application, and the application completes the SAML processing, establishes a secure session with the user and redirects the user to the application. Identity-Enabled Web Services In the case of identityenabled Web services, PingFederate supports both SOAP-based and REST-ful APIs. In the SOAP case, PingFederate receives the X.509 certificate from a Web service client and uses a security token service to translate the certificate into a SAML assertion that it places in the SOAP header. SAML is the protocol of choice because it s designed to be portable and secure in hostile environments. When the Web service provider receives the SAML assertion, it can make a quick, complete determination about whether the request is authorized. Clients Browser SOAP APIs Service Provider RESTful APIs PingFederate also supports the OAuth 2 standard for REST-based Web services, which numerous government agencies are starting to use. 0

Putting It All Together Meeting OMB M-- Today and Tomorrow The mandates of OMB M-- have raised the bar for enabling the usefulness of CAC and PIV credentials in federal agencies. Agencies that have made significant progress issuing smart cards must leverage that investment today and going forward. A multitude of ways exist for agencies to adapt their logical access control systems (LACS) infrastructure to accommodate CAC and PIV cards for authentication, including a variety of solution alternatives and implementation approaches. Analyzing the costs, benefits and timeliness of custom development, COTS solutions or some combination of both is a critical part of agency s transition plan. Taking a close look at the capabilities of Ping Identity s PingFederate for CAC and PIV enablement can benefit many government agencies. We invite you to visit our website and contact us for more information. About Ping Identity Ping Identity provides cloud identity security solutions to the world s foremost companies, government organizations and cloud businesses. For more information, dial U.S. toll-free 877.898.2905 or +.303.468.2882, email sales@pingidentity.com or visit pingidentity.com/gov. 8/2.2 202 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingFederate Express, PingConnect, PingOne, PingEnable, the Ping Identity logo, SignOn. com, Auto-Connect and Single Sign-On Summit are registered trademarks, trademarks or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies.