Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing



Similar documents
Single Sign On Implementation Guide

Introduction to SAML

SAML Security Option White Paper

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

SAML for EPCS (Electronic Prescription of Controlled Substances)

The Top 5 Federated Single Sign-On Scenarios

Copyright Pivotal Software Inc, of 10

Improving Security and Productivity through Federation and Single Sign-on

Enhancing Web Application Security

Can We Reconstruct How Identity is Managed on the Internet?

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Single Sign On. SSO & ID Management for Web and Mobile Applications

ILHIE Direct Secure Messaging Solution

VASCO: Compliant Digital Identity Protection for Healthcare

Cloud Computing. Chapter 5 Identity as a Service (IDaaS)

How To Create Trust Online

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

HOL9449 Access Management: Secure web, mobile and cloud access

Identity: The Key to the Future of Healthcare

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Flexible Identity Federation

Single Sign On at Colorado State. Ron Splittgerber

OpenID & Strong Authentication

OpenLogin: PTA, SAML, and OAuth/OpenID

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

The Primer: Nuts and Bolts of Federated Identity Management

How To Use Salesforce Identity Features

Egnyte Single Sign-On (SSO) Installation for OneLogin

OPENIAM ACCESS MANAGER. Web Access Management made Easy

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Microsoft Office 365 Using SAML Integration Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Identity Implementation Guide

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

The Primer: Nuts and Bolts of Federated Identity Management

TIB 2.0 Administration Functions Overview

WHITE PAPER Usher Mobile Identity Platform

Who s There? A Methodology for Selecting Authentication Credentials. VA-SCAN October 5, 2009 Mary Dunker dunker@vt.edu

CA CloudMinder. Getting Started with SSO 1.5

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

SAM Context-Based Authentication Using Juniper SA Integration Guide

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Single Sign-On Instructions (SSO) Registration for the SSO

TrustedX - PKI Authentication. Whitepaper

Building Secure Applications. James Tedrick

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

TrustedX: eidas Platform

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

OIX IDAP Alpha Project - Technical Findings

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

MyLLP Customer Portal User Guide Registration

Adding Stronger Authentication to your Portal and Cloud Apps

Scalable Authentication

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

State of Michigan Single Sign-On Registration Instructions for First Time Users

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information

Configuring Parature Self-Service Portal

SUPPORTING PRESCRIPTION DRUG MONITORING PROGRAMS

Getting Started with AD/LDAP SSO

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

Glinda Cummings World Wide Tivoli Security Product Manager

DIGIPASS as a Service. Google Apps Integration

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

Single Sign-On Implementation Guide

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Understanding EHRs: Common Features and Strategic Approaches for Medicaid/SCHIP

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide

OneLogin Integration User Guide

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Transcription:

Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing Brian Seggie Director of Security 1

Why are we doing this? Leverage large MICAM investment ($30 M) Improve identity verification to reduce fraud Reduce # of IDs and passwords for participants Simplify healthcare provider workflows Reduce IT staff workload (fewer account creations) Improve security by implementing standards-based processes 2

We [providers] (... ) are busily seeing patients and trying to do it as quickly as possible in hospitals, clinics and especially ERs that have no off switch but which do track our quality in part by tracking our speed and efficiency. Thus, we have little time to spend logging on [to systems]. (... ) It [passwords and security] was a nice idea but now it s a poison. It is the law of unintended consequences on steroids. It s all redundant, irrelevant, obnoxious busy work that stands between us and efficiency. If you really insist on it, then make it all biometric (... ). Because tracking usernames and passwords is starting to take up more of our fragile brains than drug doses and diagnoses. And that, my friends, is not good. Edwin Leap, MD Tech January 26, 2015 More time for patients http://www.kevinmd.com/blog/2015/01/dear-health-please-understand-frustrations.html 3

Before single sign-on Health Systems Health Plans Direct Secure Messaging HISPs Statewide Health Provider Directory Consent and Advanced Directive Registries State of Michigan MICAM Gift of Life Registry (organ donors) Each system requires a separate user ID and password leading to lost passwords and delays in accessing systems ID: John Robert Password: ************ ID: Jrobert Password: ******** ID: Robert Password: ***** ID: RobertJ Password: ********* ID: Robert.John Password: ***** ID: John.Robert Password: ************ ID: Robert1 Password: ******* Copyright 2015 Michigan Health Information Network Shared Services 4

After single sign-on Health Systems Health Plans Direct Secure Messaging HISPs Statewide Health Provider Directory Consent and Advanced Directive Registries State of Michigan MICAM Gift of Life Registry (organ donors) One trusted digital credential to access all needed systems Copyright 2015 Michigan Health Information Network Shared Services 5

What are federated Identities? A federated identity is a trusted form of identification such as a login ID and password that can be used to access multiple systems including those outside the home organization. Federated identity management (FIdM) is an arrangement among multiple organizations that lets subscribers use the same identity data to access the resources (services) of other organizations. 6

Federated identities for healthcare Federated Identity Management consists of: Policies, Practices, Protocols or the three P s POLICIES: Legal and Trust Framework development The legal agreements that make create trust beyond reproach Trusted Data Sharing Organization Agreements (TDSOA) Use Case Agreements (UCA) PRACTICES: Participant and process implementation Process workflow precise series of steps User Acceptance Testing (UAT) Monitor the process end-to-end walk-through with participants PROTOCOLS: The technical connectivity between systems Identity Proofing NIST, Kantara and DirectTrust Levels of Assurance Standards include SAML 2.0, XACML, JSON, OAUTH, OpenID, UMA 7

Policies: Legal framework for trust Leverage the existing MiHIN Legal framework to cover the exchange of trusted identities and federated services: Trusted Data Sharing Organization Agreements Use Case Summaries (UCS) Use Case Agreements (UCA) Single Sign-on Use Case Security requirements Other legal agreements as needed 8

DATA SHARING (QDSOA,VQDSOA, CQDSOA, SSOA, SSSOA) Legal infrastructure ORGANIZATION AGREEMENT Definitions Basic Connection Terms Use Case #1 QO Data Sharing Agreements Use Case #2 Use Case #3 Use Case Basic BAA Terms Minimal Operational SLA Contracting & Payment Cyber Liability Insurance Termination Federated Services, Identity Sharing Agreements SSO Use Case #1 Use Case #2 Use Case #3 Use Case Copyright 2014 - Michigan Health Information Network Shared Services 9

NIST Levels of Assurance (LOA) NIST 800-63 lists Levels of Assurance (LOA) for credentials Project utilizes NIST criteria on whether an ID is trusted for access to specific systems or information to promote LOA 3 Other LOA levels will be supported during the project NIST Levels of Assurance LOA 1 - Little or no confidence exists in the asserted identity LOA 2 - Confidence exists that the asserted identity is accurate LOA 3 High confidence in the asserted identities* LOA 4 Highest level of assurance. Mostly used by U.S. Government *recommended for statewide adoption in HIT by MOAC Security WG 10

Practices: Process implementation Defined workflow for providers to obtain trusted identities Tested process with MiHIN interns playing doctors to test the process and application at USPS retail location Monitored providers actually going through process of registering for an LOA 3 identity and using the new credential at both USPS and United Physician sessions Menlo Hi-tech Anthropologists monitored identity registration process for improvements to GUI, training, and provider registration Documented findings with recommendations for registration and authentication process improvements 11

Further opportunities Look for more opportunities where federating identities between healthcare organizations can improve efficiencies, workflow, user experience or security Organ Donation Health Systems EHRs Payers Labs Pharmacies Other 12

Protocols: Technical connectivity Initial Identity and Service Providers: 2 Large Michigan Hospitals Direct Secure Messaging HISPs Personal Health Records (PHRs) MiHIN Biometric Trusted Identity Provider Statewide Health Provider Directory (HPD) (Salesforce.com) Planned Identity and Service Providers: State of Michigan MiLogin Additional Health Systems and Health Plans Consent and Advanced Directive Registries Patient Portals 13

Example metadata - user attributes Example User Attributes List: 1 Name (First/Last) 2 Display Name 3 Person Entitlement, (NIST LOA 1-4) 4 Role (Provider, Consumer, Researcher, etc ) 5 Contact Info (E-mail, Phone) 6 Second Factor / Biometric ID 7 Employee ID (Not E-mail) 8 Common Key 9 National Provider Identifier (NPI) 14

Trusted identity registration system Created an Identity Provider (IdP) capable of registering trusted identities that can be exchanged with other trusted organizations Establish identity registration and proofing system at two large Michigan Health Systems Two portable biometric registration systems available that can be moved to any location to register providers Remote Identity Proofing Services Issuing Trusted Identities (RIPSITI) a new option! 15

Trusted identity registration sessions Actual Comments That was so easy First Provider, Dr. Robert Jackson registering for LOA 3 with biometric We re done already? Registration session at United Physicians by health system staff 16

Biometrics as second factor Fujitsu Palm Scanners Iris Scanners 17

USPS digital credential process MiHIN Identity Registration Step 1 Provider presents credentials to passport clerk at USPS retail outlet passport window (or Secretary of State, or other onsite locations) Step 2 Obtain secure biometric identity by scanning palm and/or iris Step 3 Register provider and link biometric template to provider account information Step 4 Digital credential created. Palm/iris scanner can now be used to login, or secure id and password can be used 18

First two use cases Single Sign-On Use Case: Basic federation of identities to access systems or information at other organizations Map an ID from one organization to an existing account at another organization Expanded single-sign-on (SSO) Automatic Account Provisioning Use Case: Accounts automatically created and authorization given based solely on extended metadata contained in access request Requires trust beyond reproach Strict policies and procedures and strong legal agreements 19

Remote Identity Proofing Service Issuing Trusted Identities (RIPSITI ) (patent pending) Brian Seggie Director of Security

Start RIPSITI

Accept terms and conditions

Select the type of account and option

Complete online form

Answer credit bureau generated questions

Verify government ID

Select government identification

Use webcam to upload government ID

Upload second identification

Start live session with registration authority

Live session with registration authority

Applicant digitally signs form

Registration authority digitally signs form

Credit Card Payment Pay

Complete

Applicant Applicant visit RIPSITI website HISP sends username and One Time Password (OTP) to Applicant separately and out ofband RIPSITI 1 ONLINE 9 HISP Provisions and creates account Applicant identification uploaded 2 3 5 Sends completed form API sends metadata to HISP to create account RIPSITI Remote Identity Proofing Service Query HPD for Provider NPI information 4 Identity Proofing Process with Live Registration Authority API sends token with metadata to Issue Trusted Identity Service 6 Store session in archive Session Archive API sends to completed form database Capability to send identity proofing metadata to other services using RIPS for identity proofing 8 7 HPD Issue Trusted Identity and/or Direct account ITI Service CKS Service Links record to form Form Archive Issue Trusted Identity Service

Welcome to Trusted Identity Biometric Capture Please place right hand on the scanner and select Start Biometric Capture

Thank you Please send questions/inquiries to: Brian Seggie Director of Security Brian.Seggie@mihin.org Jeff Livesay Associate Director Jeff.Livesay@mihin.org Sue Kish Program Manager Sue.Kish@mihin.org 38