French Justice Portal. Authentication methods and technologies. Page n 1



Similar documents
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Multi-factor authentication

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

2 FACTOR + 2. Authentication WAY

Entrust IdentityGuard

Improving Online Security with Strong, Personalized User Authentication

Guide to Evaluating Multi-Factor Authentication Solutions

Moving to Multi-factor Authentication. Kevin Unthank

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

2 business days from the date of K-Cyber Invest registration.

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Biometric SSO Authentication Using Java Enterprise System

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Digital Signatures on iqmis User Access Request Form

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Two-Factor Authentication Making Sense of all the Options

Digital identity: Toward more convenient, more secure online authentication

A Method of Risk Assessment for Multi-Factor Authentication

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

etoken Single Sign-On 3.0

Application of Biometric Technology Solutions to Enhance Security

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Accredited Certification Services on Cloud Environment. SungEun Moon KOSCOM 17 September, 2012

22 nd NISS Conference

Secure your Privacy. jrsys, Inc. All rights reserved.

Alternative authentication what does it really provide?

2 factor + 2. Authentication. way

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Enhancing Web Application Security

Advanced Biometric Technology

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Multi-Factor Authentication Core User Policy and Procedures

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

One-Time Password Contingency Access Process

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Facebook s Security Philosophy, and how Duo helps.

Multi-Factor Authentication of Online Transactions

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ADVANCE AUTHENTICATION TECHNIQUES

Two-factor authentication service for applications and desktops

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

A Feasible and Cost Effective Two-Factor Authentication for Online Transactions

May For other information please contact:

Multifactor authentication systems Jiří Sobotka, Radek Doležel

A brief on Two-Factor Authentication

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Creating Trust Online TM. Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates

STRONGER AUTHENTICATION for CA SiteMinder

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

International Journal of Software and Web Sciences (IJSWS)

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Finger Vein digital biometric signature: use cases

How Secure is Authentication?

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

ViSolve Open Source Solutions

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Service Whitepaper

ADDING STRONGER AUTHENTICATION for VPN Access Control

Authentication Levels. White Paper April 23, 2014

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

How To Choose An Authentication Solution From The Rsa Decision Tree

Remote Access Securing Your Employees Out of the Office

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Advanced Authentication

WHITE PAPER Usher Mobile Identity Platform

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Presentation Rundown. Introduction Product Overview Product Features Product Value Product Applications Question and Answer

IMS Health Secure Outlook Web Access Portal. Quick Setup

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

SafeNet Authentication Client (Windows)

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.

Authentication Solutions Through Keystroke Dynamics

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)

Two-Factor Authentication

Multi-Factor Authentication FAQs

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

W.A.R.N. Passive Biometric ID Card Solution

The Convergence of IT Security and Physical Access Control

Transcription:

French Justice Portal Authentication methods and technologies n 1

Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2

Identification and authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Identification precedes authentication in order to be recognized by the system. Identification is communicating someone's identity to the system. One person can have multiple identities (idcard, driver license, passport, social security card, credit / debit cards, phones...) Authenticating is verifying someone's identity. n 3

Strong authentication An authentication factor is a piece of information and process used to authenticate or verify a person's identity : Something I know (password, PIN code ). Something I have (USB key, smart card, smart tokens ). Something I am (biometrics). Something I can do (behavioral biometrics). Two-factor authentication (T-FA) is a system wherein two different factors are used in conjunction to authenticate. Using more than one factor to authenticate is called strong authentication. n 4

Authentication methods Simple password authentication (logon + password). One Time Password (OTP) : Hardware generated OTP : OTP tokens (SecurID, ActicCard). Software generated OTP sent by sms or email. Digital certificates : Software certificates. Certificates on contact devices : smart cards, USB Tokens. Certificates on contact less devices : RFID induction technology. Biometrics. For more information see appendix 1 n 5

Risks and threats Hacking or cracking : Physical theft (password, smart card, computer, ). Logical copy (certificate, random numbers, ). Key loggers, screen grabbers. Phishing. Public internet terminals require special attention (cyber cafes, public interactive terminals,...). Multiple authentication factors reduces the threat. For example, the pin code is a supplementary protection when your smart card is stolen. n 6

Comparison criteria Main comparison criteria for authentication methods are : Security level. Deployment : important criteria for mass diffusion. Costs : Deployment cost (important criteria for mass diffusion) Total cost of ownership (TCO). Mobility : usage in multiple terminals (home, office, cybercafes,...). We exclude these authentication methods from the comparison : biometrics (public acceptance, cost). certificates on contact less devices (cost). All proposed authentication methods are now mature and industrialised. n 7

Authentication methods - comparison Criteria Mobility Security level Deployment Cost Authentication methods Simple password Software OTP Smart token OTP Software certificate USB Token certificate J J K one factor L transfer not easy K usb port + driver Smart cards certificate K reader + driver J J J J J K reader and device distribution K K device distribution device distribution J K K K L sauf si sms Example of use End user usability Digital signature compliant Webmail, online bankin, E-CB Activ Card, SecurId French Gov. Taxes, VPN access,... French notariat (REAL), lawyer (@vocats) French notariat K J K J J 2 steps process complex installation L L L J J n 8

Authentication methods comparison summary Advantages Inconveniences Comments Simple password + low cost - basic authentication Low security level application with large public deployment Software OTP Software certificate + cost / strong authentication + strong authentication + digital signature compliant - 2 steps authentication process - cost if sent by sms - mobility is difficult - administration, installation Smart token OTP + strong authentication - deployment cost - distribution process - no digital certificate (signature) USB token certificate Smart card certificate + strong authentification + digital certificate for signature - deployment cost - complex distribution process Suitable for large public deployment with high security level Not suitable for large public deployment with occasional use Not suitable for large public deployment Not suitable for large public deployment with occasional use. Prefer existing national digital identification solution. n 9

Conclusion For a short term approach, we recommend usage of low cost solutions without any hardware device deployment : Simple password for procedures with basic authentication needs and low security requirements. OTP (email or sms) for procedures requiring a higher security level. These 2 methods are not compliant with digital signature. Further, we recommend using the future French digital ID Card (CNIE) certificates for authentication and signature. The CNIE project is managed by the French national agency for secured ID (ANTS). n 10

Appendixes 1 authentication methods detailed presentation 2 authentication methods comparison n 11

Appendix 1 Authentication methods detailed presentation n 12

Simple password authentication The user is authenticated with a login ID and a password. Password authentication is the most common and the most simple authentication method. Security level is low. A well managed password is not easy to crack : minimal length, type of character used, password duration... n 13

One Time Password The password is dynamically generated at each connection request and has a short life time duration. The password is generated by a software calculator. The calculator is protected with a pin code (it could be stolen). Often the OTP is combined with a simple password authentication for a two factor authentication (T-FA). n 14

Digital certificate A digital certificate is a digital identity card whose purpose is to identify a physical or non physical entity. A digital certificate is a link between the physical and digital entities, delivered by a trusted third party (CA = Certificate Authority). X509 is the ITU-T standard for digital certificates. Depending on security level, there a several certificate classes : Class 1 certificate : delivered by mail. Class 2 certificate: a proof of identity is required. Class 3 certificate : physical presentation of the requester to the delivering authority is required (face to face). Class 3+ certificate : class 3 certificates are directly generated on a token, for example a smart card, delivered with a face to face process. The higher security level is obtained with certificates on hardware support such as smart card or USB Token. n 15

Biometrics Biometrics is often used in the mean of uniquely recognizing humans, based upon one or more intrinsic physical or behavioural traits. Biometric characteristics can be divided in two main classes : Physiological, related to the shape of the body : face recognition, fingerprints, iris recognition, hand geometry, DNA,... Behavioural, related to the behaviour of a person : signature verification, keystroke, voice,... Biometric identification appears very intrusive to a majority of persons and public acceptance is a great concern. The cost of biometric devices is high. n 16

Appendix 2 Authentication methods comparison n 17

Gartner hype cycle n 18

Costs elements Recent technologies are expansive (biometrics, vocal recognition). For mature technologies (password, certificates) the initial acquisition cost disadvantages technologies with physical devices to deploy (cards, readers, ). The total cost of ownership (TCO) must include managing costs (help desk, password management, ). n 19

Mobility Some authentication methods may be useless depending where the user is connected. Simple password Software certificate OTP USB Token certificates Smart card certificates Home PC Justice interactive terminal Public cyber area Other PC 1 1 1 4 2 3 OK KO 1 : One certificate per person. 2 : if the PC have a compatible card reader. 3 : if software components ares installed. 4: if the smard card reader is also provided n 20