Multi-factor Authentication Considerations for InCommon Silver. Mary Dunker Virginia Tech dunker@vt.edu InCommon Confab April 26, 2012



Similar documents
Who s There? A Methodology for Selecting Authentication Credentials. VA-SCAN October 5, 2009 Mary Dunker dunker@vt.edu

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Graduate School Rankings By U.S. News & World Report: ACCOUNTING PROGRAMS

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Canadian Access Federation: Trust Assertion Document (TAD)

CAS s IDP system and resources in Education Cloud

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Undergraduate School Rankings By U.S. News & World Report:

Graduate School Rankings By U.S. News & World Report: MARKETING PROGRAMS

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Graduate School Rankings By U.S. News & World Report: INDUSTRIAL/MANUFACTURING ENGINEERING

Authentication Tokens

BENCHMARKING UNIVERSITY ADVANCEMENT PERFORMANCE

Future directions of the AusCERT Certificate Service

Authentication Methods

Graduate School Rankings By U.S. News & World Report: CIVIL ENGINEERING

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Evolving Strong Authentication at The University of Arizona

TABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ...

SafeNet Authentication Client

Net-Temps Job Distribution Network

Yale Software Library

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Canadian Access Federation: Trust Assertion Document (TAD)

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006

The Password Problem Will Only Get Worse

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Can We Reconstruct How Identity is Managed on the Internet?

Three-Year Moving Averages by States % Home Internet Access

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Authentication Integration

Public School Teacher Experience Distribution. Public School Teacher Experience Distribution

Graduate School Rankings By U.S. News & World Report: ENGINEERING SCHOOLS

E-Infrastructure Security: An Investigation of Authentication Levels of Assurance (LoAs)

TABLE OF CONTENTS. Vendor Registration Usage of Digital Signature Certificate... 3

VASCO: Compliant Digital Identity Protection for Healthcare

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

ESET Secure Authentication

Identity: The Key to the Future of Healthcare

Understanding the Role of Smart Cards for Strong Authentication in Network Systems. Bryan Ichikawa Deloitte Advisory

A Method of Risk Assessment for Multi-Factor Authentication

NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST

MAINE (Augusta) Maryland (Annapolis) MICHIGAN (Lansing) MINNESOTA (St. Paul) MISSISSIPPI (Jackson) MISSOURI (Jefferson City) MONTANA (Helena)

The Virginia Electronic Notarization Assurance Standard

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Single Sign On Implementation Guide

Graduate School Rankings By U.S. News & World Report: COMPUTER ENGINEERING

NAIC ANNUITY TRAINING Regulations By State

Graduate School Rankings By U.S. News & World Report: ELECTRICAL/ELECTRONIC ENGINEERING

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Graduate School Rankings By U.S. News & World Report: ENVIRONMENTAL ENGINEERING

Graduate School Rankings By U.S. News & World Report: PSYCHOLOGY (RESEARCH) - Ph.D.

Graduate School Rankings By U.S. News & World Report: MECHANICAL ENGINEERING

DEA's New Proposed Regulations For E-Prescribing

State-Specific Annuity Suitability Requirements

Transcription:

Multi-factor Authentication Considerations for InCommon Silver Mary Dunker Virginia Tech dunker@vt.edu InCommon Confab April 26, 2012

Disclaimer All opinions expressed in this presentation are strictly my own. IdPs should perform due diligence in justifying their management assertions when applying for InCommon Silver certification. 2

Multi-factor for Silver Community approach Virginia Tech s approach Your approach? 3

4 Our Goal

5 Our Guidance

Why Multi-factor? Deficiencies in meeting some aspect of requirement Handing out something you have creates opportunity to strengthen process Multi-factor can strengthen authentication security 6

Our Problem 7 4.2.3 CREDENTIAL TECHNOLOGY These InCommon IAPs are based on use of shared Authentication Secret forms of identity Credentials. If other Credentials are used to authenticate the Subject to the IdP, they must meet or exceed the effect of these requirements.

CIC Silver Collaboration University of Chicago University of Illinois Indiana University University of Iowa University of Michigan Michigan State University University of Washington (partner) University of Minnesota Ohio State University Pennsylvania State University Purdue University University of Wisconsin-Madison Virginia Tech (partner) 8

9 Community Approach Review sections of IAP unique to multi-factor. 4.2.3.1 Credential Unique Identifier 4.2.3.2 Resistance to Guessing Authentication Secret 4.2.3.3 Strong Resistance to Guessing Authentication Secret 4.2.3.4 Stored Authentication Secrets 4.2.3.5 Protected Authentication Secrets

Community Approach Criteria: Describe how to meet or exceed requirements using MF. Guidance from NIST 800-63. Examples: Single factor token = something you have and must be used in conjunction with another factor something you know Multi-factor token = something you have that requires activation with another factor 10

Types of Tokens Out-of band token One time password token Digital certificate Cryptographic token Vendor security specifications 11

Single-factor Token Combination Question: Must both factors meet all requirements? Consensus: At least one factor must meet or exceed. Consider whether factor that does not meet requirements strengthens or weakens security. 12

Multi-factor (integrated) Token Considerations How is device activated? How is the shared Authentication Secret stored and protected? Does activation password meet Silver? 13

Community Resource: Multi-factor Considerations Examples Single factor combination Multi-factor token Sample Management Assertions for multi-factor token requiring activation FAQ https://spaces.internet2.edu/display/ InCAssurance/Multi-factor+Considerations 14

Virginia Tech s Approach Digital Certificate on USB hardware token (SafeNet 64K USB etoken Pro) Central Authentication Service Shibboleth 15

Virginia Tech s Approach Personal Digital Certificate (PDC) with bronze and silver object identifiers (OID) 16

Virginia Tech s Approach on USB hardware token (SafeNet 64K USB etoken Pro) issued in-person 17

Integration x.509 authentication in CAS login handler CAS sees bronze or silver OID CAS passes information to Shib Shib asserts Bronze or Silver Identity Assertion Qualifier 18

Why? Userid/password process lacked identity proofing step Scope analysis (during CIC collaboration) showed Silver likely to only be required by services that employees use not students. PDCs on etokens already issued in-person, to employees Existing policy documents for PKI helped with audit 19

Your Approach Who is planning to use multifactor for InCommon Silver? What kinds of MF devices are you using? How s it going? https://spaces.internet2.edu/display/ InCAssurance/Community+Contributions 20