NOK NOK LABS AUTHENTICATION & OTT SERVICES



Similar documents
THE CHANGING FACE OF MOBILE PAYMENTS SECURITY

Scalable Authentication

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

UAF Architectural Overview

How Secure is Authentication?

How Secure is Authentication?

TECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION. Any device. Any application. Any authenticator.

Mobile Connect & FIDO

Social Media Single Sign-On: Could You Be Sharing More than Your Password?

Device-Centric Authentication and WebCrypto

User Identity and Authentication

Can We Reconstruct How Identity is Managed on the Internet?

NCSU SSO. Case Study

TIT E IS A. Social Media. Soziale Netze und IT Sicherheit. Herausforderung? Chance? Alfred Bach Solution Strategist ALPS WE CAN IN BO

The Password Problem Will Only Get Worse

Helping organizations secure and govern application services for SOA, Web and the Cloud

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

Enhancing Web Application Security

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Apache Milagro (incubating) An Introduction ApacheCon North America

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory and Group Policy Features

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

TrustedX: eidas Platform

Safewhere*Identify 3.4. Release Notes

Times they are a-changin

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Enabling SSO for native applications

FIDO Trust Requirements

expanding web single sign-on to cloud and mobile environments agility made possible

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

A Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Customer Identity and Access Management (CIAM) Buyer s Guide

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

Moving Beyond User Names & Passwords Okta Inc. info@okta.com

CLAIMS-BASED IDENTITY FOR WINDOWS

The Top 5 Federated Single Sign-On Scenarios

HOL9449 Access Management: Secure web, mobile and cloud access

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

OpenID & Strong Authentication

Enterprise Mobility Space

Interconnecting Devices and Applications of all Brands to Invent New Business Opportunities for Network Service Providers

OpenID Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

OpenSSO: Cross Domain Single Sign On

I D C T E C H N O L O G Y S P O T L I G H T

MONETIZING THE MOBILE APP. A Light Reading Webinar Sponsored by

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

SECUREAUTH IDP AND OFFICE 365

I D C V E N D O R S P O T L I G H T

WHITE PAPER. Active Directory and the Cloud

Flexible Identity Federation

Guide to Evaluating Multi-Factor Authentication Solutions

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

MOBILE HELIX LINK SDK OVERVIEW A MOBILE HELIX WHITEPAPER

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox

State of Hawaii Excellence in Technology Award Nomination. Single Sign On (SSO) for the Hawaii State Department of Education

The Role of Federation in Identity Management

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

S E P T E M B E R

Mid-Project Report August 14 th, Nils Dussart

Blue Jeans Network Security Features

Privacy and Security Advantages of Social Login. White Paper

Glinda Cummings World Wide Tivoli Security Product Manager

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA

My Stuff Everywhere Your Content On Any Screen

API-Security Gateway Dirk Krafzig

Is Consumer-Oriented Strong Authentication Finally Here to Stay? Arshad Noor, CTO, StrongAuth, Inc. Professional Strategies S22

Cloudessa AAA and Captive Portal Cloud Service

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

FIDO: Fast Identity Online Alliance Privacy Principles Whitepaper vfeb2014

White paper December Addressing single sign-on inside, outside, and between organizations

Moving Beyond User Names & Passwords

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

managing SSO with shared credentials

How to reduce the cost and complexity of two factor authentication

CLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT

Interoperate in Cloud with Federation

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

Statement of Direction

A Standards-based Mobile Application IdM Architecture

SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity

The Convergence of IT Security and Physical Access Control

Brian Spector CEO, CertiVox. CloudAuthZ

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Security Landscape of Cloud Computing

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

2-FACTOR AUTHENTICATION WITH

Taking the cloud to your datacenter

Transcription:

NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1

NOK NOK LABS The authentication challenge

A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME... NOK NOK LABS 3

A DILEMMA...WE CANNOT REALIZE THE FULL POTENTIAL OF THE CLOUD, MOBILITY OR E-COMMERCE. NOK NOK LABS 4

IDENTITY & AUTHENTICATION Single Sign-On Federa-on Authen-ca-on User Management Physical- to- Digital Iden-ty NOK NOK LABS Iden-ty Services 5

THE HUMBLE IGNITION KEY NOK NOK LABS 6

THINGS ARE CHANGING Convenience, Security, Personalization Attacks First Steps Next Steps Sony 77 M Evernote 60 M Rockyou 32 M LinkedIn Yahoo Twitter 6.5 M 450 K 56 K Apple Evernote Facebook Twitter Google? NOK NOK LABS 7

NOK NOK LABS Reality Check

HOW ARE WE DOING? USERS FRUSTRATED 25 ACCOUNTS 8 LOGINS / DAY 6.5 PASSWORDS ORGANIZATIONS OVERWHELMED $7.2M / DATA BREACH $15 / PASSWORD RESET $50-120+ / TOKEN ECOSYSTEMS INHIBITED FRAGMENTED INFLEXIBLE FRICTION EVERYWHERE NOK NOK LABS 9

THE AUTHENTICATION TOWER OF BABEL? Silos, proprietary, privacy, reliance on 3 rd party, tolls NOK NOK LABS 10

NOK NOK LABS Towards a Solution

AUTHENTICATION: MISSING PIECE OF THE CLOUD, MOBILE & INTERNET OF THINGS 75% OF THE DIGITAL UNIVERSE CREATED, CAPTURED OR REPLICATED IN THE CLOUD INCREASING USE OF INTERNET OF THINGS US ECOMMERCE PROJECTED AT $325BN BY 2015 5BN MOBILE DEVICES MORE THAN THE EARTH S POPULATION 3.1 TRILLION HARD DRIVES WORTH OF DATA CONSUMED DAILY IN THE US EXPLOSION OF ONLINE DATA ABOUT PEOPLE & THEIR ACTIONS = MORE KNOWLEDGE OF WHAT MAKES US UNIQUE NOK NOK LABS 12

WHAT IS NEEDED COMMON AUTHENTICATION PLUMBING Usable Authentication Users Open Standard Plug-In Approach Interoperable Ecosystem Devices Cloud/ Enterprise Federation 13

IMPLEMENTATION CHALLENGE A PLUMBING PROBLEM: SHADES OF RUBE GOLDBERG Organizations Applications Authentication Methods RP 1 RP 1 App 1 Silo 1 Silo 2 App 2 New App Silo 3 Silo N?? NOK NOK LABS 14

UNIFIED STANDARDS & AUTHENTICATION AGILITY ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. Organizations Applications Authentication Methods RP 1 RP 1 App 1 FIDO UNIFIED STANDARDS App 2 New App? NOK NOK LABS 15

ADDRESS USABILITY & DIVERSITY Usability Drives Usage No passwords Existing devices Flexible authentication Engagement Completed transactions Security compliance NOK NOK LABS 16

THE OTHER HALF OF THE EQUATION PASSWORDS SSO/FEDERATION SAML STRONG AUTH OpenID Recreated PMS First Mile Second Mile NOK NOK LABS 17

MULTIPLE IMPLEMENTATIONS AVAILABLE No Secure HW FIDO SDK Secure Crypto + Storage Secure Execution Environment User Space UX Layer Input, Display Crypto Layer FIDO SDK UX Layer Input, Display FIDO SDK Secure Hardware Crypto Layer UX Layer Input, Display Crypto Layer NOK NOK LABS

A PEEK INTO MODERN AUTHENTICATION EXPLICIT AUTHENTICATION IMPLICIT AUTHENTICATION NOK NOK LABS 19

IDENTITY SOLUTION PATTERNS WHICH WILL PREVAIL? User-Centric Relationship-Centric Trust-Me-Me-Me Regulation-Centric 20

ONE-SWIPE, ONE-PHRASE, ONE-LOOK AUTHENTICATION ARE YOU READY? Select Authenticate Purchase Nok Nok Labs 21

NOK NOK LABS The FIDO Alliance

GOAL: SIMPLER STRONGER AUTH INTERNET SERVICES COMPONENT & DEVICE VENDORS SOFTWARE & STACKS

FIDO EXPERIENCES ONLINE AUTH REQUEST LOCAL DEVICE AUTH SUCCESS PASSWORDLESS EXPERIENCE (UAF STANDARDS) Transac2on Detail Show a biometric Done SECOND FACTOR EXPERIENCE (U2F STANDARDS) Login & Password Insert Dongle, Press bu=on Done

OPTIONS FOR SERVICES Passwordless UX = UAF: Universal Auth Framework User carries client device with UAF stack installed User presents a local biometric or PIN Website can choose whether to retain password Second Factor UX = U2F: Universal Second Factor User carries U2F device with built-in support in web browsers User presents U2F device Website can simplify password (e.g, 4 digit PIN) Simpler Stronger Authentication

WHAT'S THE BENEFIT? For Users Easy to use No more worrying about passwords Be safer on the Internet For Internet Services Greatly improved PKI based security Increased user engagement User brings own device Build server once: Leverage any auth method For Vendors Standardization ignites market Move past fragmented custom solutions

FIDO TODAY Technical Working Groups active o Public Spec Drafts early 2014 o Pilots in progress o Complement to existing standards & efforts! e.g., Federation, OpenID, SAML etc Actively adding to FIDO membership o Targeting Internet Services, Client Platform Owners, Device & Component Vendors, System Integrators Simpler Stronger Authentication JOIN US!! info@fidoalliance.org rajiv@noknok.com

AUTHENTICATION IS THE GATEWAY SERVICES, REVENUE STREAMS, DIFFERENTIATION Mobile Payments M-Commerce Authenticate Movies Stores Books Music Internet of Things Cloud Services 28

THE ECOSYSTEM INTERNET SERVICES COMPONENT & DEVICE VENDORS SOFTWARE & STACKS

Any Device. Any Application. Any Authenticator.