Can We Reconstruct How Identity is Managed on the Internet?



Similar documents
NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Identity, Credential, and Access Management. Open Solutions for Open Government

FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu

Identity: The Key to the Future of Healthcare

The Role of Federation in Identity Management

Scalable Authentication

Frans Bolk CEO UniQ-ID

NOK NOK LABS AUTHENTICATION & OTT SERVICES

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

The Impact of NSTIC on the Internal Revenue Service. Economic Case Study: Planning Report 13-2

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Biometrics in Identity as a Service

Auth0 SSO Drives B2B Expansion

Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Interoperate in Cloud with Federation

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

The Security Framework 4.1 Programming and Design

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Identity Relationship and Access Management for the Extended Enterprise

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

Cloud-Based Identity Services

OpenID & Strong Authentication

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Federated Identity for Cloud Computing and Cross-organization Collaboration

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Agenda. How to configure

Glossary of Key Terms

NSTIC National Program Office Discussion Draft STANDARDS CATALOG

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

The identity management (IdM) ecosystem: minding the gaps

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Intelligent Security Design, Development and Acquisition

CA Technologies Strategy and Vision for Cloud Identity and Access Management

Introduction to SAML

OIX IDAP Alpha Project - Technical Findings

Device-Centric Authentication and WebCrypto

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

TrustedX: eidas Platform

Enhancing Web Application Security

Building Secure Applications. James Tedrick

CAS s IDP system and resources in Education Cloud

The Top 5 Federated Single Sign-On Scenarios

Innovations in Digital Signature. Rethinking Digital Signatures

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

SIGNIFICANT CHANGES DOCUMENT

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Mobile Connect & FIDO

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

A trusted identity management system is not only essential for ensuring your customers safety and confidence.

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Privacy and Security Advantages of Social Login. White Paper

Federal Identity, Credential, and Access Management Trust Framework Solutions

Mobile Security. Policies, Standards, Frameworks, Guidelines

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Dave Primmer May 2010

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

The increasing popularity of mobile devices is rapidly changing how and where we

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

The Primer: Nuts and Bolts of Federated Identity Management

SAML and OAUTH comparison

Transcription:

Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate

Session abstract Session Learning Objectives: Understand the reasons a new Internet identity approach is needed Envision how current government & private federation based approaches are showing the way to an Internet scale approach Project into the future of how Internet identity could operate if this approach continues to increase in popularity and what implications this could have for existing and new players Classify the challenges of policy, interoperability, legal, privacy, and others that stand in the way of broader adoption Recommend actions for both individuals and organizations to accelerate the adoption of this new approach 2

Agenda Internet identity problem Solution overview Overview of current trust frameworks Where is there progress? What is still missing? Trends to monitor Conclusion Q&A 3

Think of the Internet Identity Problem as Humpty Dumpty Now that it is broken, how do we put it back together? 4

The Internet Identity problem Simple to understand, hard to solve How do I securely and accurately link these two? Is a carbon life form Has a name & address Has home phone Pays taxes Has utility bills Has privacy wants Uses financial institution Multiple email addresses Multiple digital identities Social media accounts Highly mobile Uses multiple devices Has many online accounts Has a transaction history Is a collection of Internet events

So what? Internet identity creates problems such as: Increased risk Identity theft High management costs Poor user experience Problem cannot be ignored Increased reliance on internet for commerce 6

Four conceptual approaches to identity B2E Identities increasingly crossing these boundaries B2B SAML B2C OpenID G2C OpenID 7

Identity was an easier issue 10+ years ago Enterprise manages B2E on premise B2C just emerging B2B and G2C in infancy Implicit trust established between the user and applications User Corporate Directory Identity Provider IAM Enterprise LAN Public Remote user In house Applications 8

Identity in 2012 Increased complexity B2E still managed by enterprise, but highly distributed workforce B2C, B2B and G2C much more established Trust between user and app no longer a given Enterprise LAN Corporate Directory Identity Provider Cloud IM Service Public Remote user User IAM Dir Dir In house Applications Dir 9

So what is a possible solution? How about trust frameworks. "Trusted identities and consumer control of personal information are essential to the effectiveness of transactions on the Internet. Trusted frameworks that provide identity assurance are a critical factor in the success of the digital identity ecosystem." Andrew Nash, Senior Director of Identity Services for Google Inc. OIX Founding Board Member

Some definitions (courtesy Kantara Initiative) Party Trust Framework Provider Relying Party Identity Provider Credential Provider Attribute Provider Description Sets the rules for operation of the trust framework; Accredits assessors Controls a resource that users wish to access Determines attributes required for access to resources Verifies identity of Subjects as specified in the trust framework Issues credentials that meet criteria for content and technical specifications as specified in the trust framework; Verifies validity of credentials when requested by Relying Party Verifies attributes associated with Subjects as specified in the trust framework

What is a trust framework? http://openidentityexchange.org/what is a trust framework Examples of Trust Frameworks Phone networks, credit card payment networks 12

Trust Framework Example 1 Kantara Initiative Joint initiative founded in 2009 by: Liberty Alliance, Concordia Project, Internet Society, Information Card Foundation and XDI.org Not a standards body cooperates with OASIS & IETF Only Approved US Government Trust Framework Provider (TFP) with certified Levels of Assurance (LoA) 1, 2 and 3 non crypto (non PKI) Currently working on user managed access (UMA) model http://www.kantarainitiative.org/ 13

Trust Framework Example 2 Open Identity Exchange (OIX) Launched at RSA 2010 Executive members AT&T, Booz Allen, CA Technologies, Equifax, Google, Symantec, Verizon Created partially out of US Government need to accept identities issued by 3 rd parties Goal: Build trust in the exchange of identity credentials online Offer frameworks with different level of assurance (LOA) LOAs based on NIST 800 63 www.openidentityexchange.org 14

Trust Framework Example 3 National Strategy for Trusted Identities in Cyberspace (NSTIC) Announced April 2011 Envisions an Identity Ecosystem a user centric online environment, a set of technologies, policies, and agreed upon standards that securely supports transactions ranging from anonymous to fully authenticated and from low to high value. Managed through NIST/Commerce Department Privacy Act of 1974 is underlying legislative framework Allows for identity providers outside government. Established National Program Office (NPO) Announced $10M program to fund 6 8 pilots in 2012 http://www.nist.gov/nstic/ 15

US Government Identity Assurance Levels Level 1 Level 2 Level 3 Level 4 Little or no confidence in asserted identity Some confidence in asserted identity High confidence in asserted identity Very high confidence in asserted identity No identity proofing required, and some confidence the same claimant is accessing the protected transaction or Data Provides single factor remote authentication using a wide range of available authentication technologies Provides multi factor remote authentication using soft cryptographic tokens, hard cryptographic tokens, and one time password tokens Provides multi factor remote authentication using hard cryptographic tokens Source http://www.cio.gov/documents/ombreqforacceptingexternally_issuedidcred10 6 2011.pdf 16

Benefits of Trust Frameworks Standardized identity interactions Early progress US Govt NIH PubMed program projects ~$3M in savings/5 yrs Simplified end user experience Reduced cost of supporting end users Reduced the friction of logins, registrations, purchases, and other online activities Increased confidence in online identity infrastructure Increased confidence in regulatory compliance 17

Progress to date US Government Trust Framework Program US ICAM LOA 1 Trust Framework operational March 2010 Enables Federal Agency websites to accept OpenID credentials Trust Framework Providers: InCommon Federation Level of Assurance 1 (provisionally approved) Kantara Initiative Level of Assurance 1, 2, and non PKI 3 (provisionally approved) Open Identity Exchange Level of Assurance 1 (provisionally approved) Approved Identity Schemes (Levels 1, 2 and non PKI 3): Identity Metasystem Interoperability (IMI) 1.0 Profile OpenID 2.0 Profile SAML 2.0 Web Browser Single Sign On Profile Approved Identity Providers Yahoo OpenID Wave Systems, OpenID 2.0, LoA 1 PayPal OpenID 2.0, LoA 1 PayPal IMI 1.0, LoA 1 VeriSign OpenID 2.0, LoA 1 Equifax IMI 1.0, LoA 1 Google OpenID 2.0, LoA 1

Why not use governments as sole online verifier? Consumers expect choice 1 size fits all is not likely solution Practical problem 200M+ people have dual citizenship (Economist) Private sector has skills and expertise Risk (perceived or real) of government monitoring online behavior can inhibit adoption Solution should be open and flexible This issue is geographic dependent In some countries, citizens are ok with this model Not all governments have the same capabilities 19

Identity Trend to monitor Google Street Identity/LMNOP Project Experimenting with authorizing access to verified street addresses Relying party sends postcard to end user s home with 1 time code User goes online and enters code Relatively low cost, relatively secure Uses cases can get more elegant (and complex) User can authorize IdP to issue physical address attribute to RP RP can contact mobile operator to verify address attribute www.streetidentity.com 20

Identity Trend to monitor User managed access (UMA) Evolution of OAuth user centric model to enhance user control over user attribute/claim usage and RP compliance requirements Protocol for users to manage what attributes to share Managed through Kantara s UMA Working Group Contributed to the IETF for consideration Planning interoperability testing and increased OpenID Connect integration in 2012 Initial implementations Newcastle University (UK) Smartam.org Fraunhofer AISEC photo sharing project User defined Photo sharing service 21

What is still missing? For everyone Use of standards to promote interoperability Linking strong credentials/authentication to identity Risk analysis Processes to automate trust establishment Portability between web and mobile environments For user Choice, privacy, portability of identity between communities For IdPs and RPs Limitation on liability As RP, what legal or contractual protection is there in event of fraud? Orgs may wait until there is a body of case law before proceeding. Confidence of good behavior by RPs Defined metrics for Level of Protection (LOP) 22

Apply If you are a Consider the following in 90+ days Relying Party Understand strengths and weaknesses of each framework. Conduct risk assessment of your environment (NIST 800 37 is good basis) Select appropriate level of assurance you expect from IdP Is accepting an ID from ID provider X acceptable? Identity Providers Credential Providers Complete internal assessment of your security procedures Publicize your due diligence Consider something like SAS 70 audit W/o these few relying parties will want to work with you If partnering with attribute providers: Determine freshness of underlying attributes Understand any liability issues associated with using 3 rd party attributes Attribute Provider Provide details on freshness of attributes Work on partnering with IdPs

In conclusion Session Learning Objectives: Trust Frameworks are one proven approach to address the Internet Identity problem Current government & private federation based approaches are showing the way to an Internet scale approach Kantara, OIX, NSTIC are proven this now Project into the future of how Internet identity could operate if this approach continues to increase in popularity and what implications this could have for existing and new players Policy, interoperability, legal, privacy challenges remain Still many challenges to be addressed, but off to a good start There are concrete actions that individuals and organizations can begin taking to take advantage of these new approaches. 24

Thank you Tracking/stalking me: Merritt.maxim@ca.com www.twitter.com/merrittmaxim http://www.linkedin.com/pub/merritt maxim/0/315/526 Blog http://community.ca.com/blogs/iam/default.aspx 25