Presentation is loading. Please wait.

Presentation is loading. Please wait.

The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.

Similar presentations


Presentation on theme: "The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication."— Presentation transcript:

1 The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication Initiative

2 2 E-Gov Program Management Office HSPD-12  Mandates all Federal Agencies issue ID credentials using FIPS-201 identity proofing procedures beginning 10/05  Mandates all Federal Agencies begin issuing SmartCards with medium assurance digital certs by 10/06  Authorization remains a local prerogative

3 3 The E-Authentication Initiative E-Gov Program Management Office Purpose and Function of the E- Authentication Program  To provide a single source of identity authentication services for Federal Agency Applications  To develop and promulgate policies and procedures to sustain a common identity federation for the Federal Government in support of e-Gov and HSPD- 12  To partner with Credential Service Providers and other Identity Federations to enable the broadest access to e-Gov services.

4 4 The E-Authentication Initiative E-Gov Program Management Office Summary of E-Authentication Approach  Four Levels of Assurance of Identity (LOA) from Policy LOA 1 and 2 are assertion-based: Userid/password, SAML, Shibboleth, etc. LOA 3 and 4 are cryptographically-based: PKI, etc.  LOA required based on standard Risk Assessment  Agency Applications (AAs) autonomous for authorization decisions  AAs rely on credentials issued by external Credential Service Providers who submit to an assessment based on a Credential Assessment Framework  Principle of reusable credentials

5 5 The E-Authentication Initiative E-Gov Program Management Office E-Authentication Initiatives  Assessment Framework for Credential evaluating the level of assurance (LOA) of identity of credential service providers  Membership in Liberty Alliance  Frequent meetings with Microsoft  Interfederation Interoperability Project with Cybertrust and Internet2/Shibboleth team (more slides later on)  Credential Assessment Framework

6 6 The E-Authentication Initiative E-Gov Program Management Office Credential Assessment Framework  A structured methodology and procedures for evaluating the LOA of a CSPs credentials  An assessment team that goes out and evaluates CSPs  A process for conflict resolution  Posting CSPs and their credential LOAs to a trust list (unfortunate term) on the website

7 7 The E-Authentication Initiative E-Gov Program Management Office FBCA Certification Authority Two way Cross-certified (FBCA High & FBCA Medium) Agencies (Legacy Agency CA policy) States Foreign Entities Citizen & Commerce Class Common (C4) Certificate Policy -certified Wells FargoAOLPEPCO Private Sector FPKI Common Policy Framework (FCPF) Certificate Policy C4 Policy Certification Authority (Included in browser list ofCAs) FCPF Policy Certification Authority (Trust anchor for Common FPKI Policy hierarchical PKI subscribers) E-Governance Certification Authority (Mutual authentication of SAML/SSL Certificates only) Qualified Shared Service Provider USDA/NCF Verisign DST Two way Cross-certified One way Cross - certified Federal PKI Assurance Level 1 Assurance Level 2 E-Governance Certificate Policy Other BridgeCAs ACES New Agency Optionally Two Way Cross - certified Two Way Cross Federal PKI The Federal PKI & The E-Authentication Federated Approach T w o w a y C r o s s - c e r t i f i e d XKMS OCSP CAM SOAP Others ©p©p Step #1: User goes to Portal to select the AA and ECP Portal Step #3: The user authenticates to the AA directly using SSL or TLS. Figure : FPKI Validation Service AA CA 1 Community 1 CA 4 CA 4bCA 4a CA 2 Community 2 Bridge CA 3 Community 3 FPKI Step #4: The AA uses the validation service to validate the certificate Step #2: The user is passed directly to the AA eAuth Trust List FBCA Certificate Policy

8 8 The E-Authentication Initiative E-Gov Program Management Office Interfederation Interoperability  Assertion-level trust transactions require federation- to-federation policy and technology interoperability initiatives Under way with inCommon (Internet2)  Crypto-level trust transactions mediated by Federal Bridge Under way with Higher Education Bridge, Pharmaceutical Industry Bridge, Aerospace Bridge

9 9 The E-Authentication Initiative E-Gov Program Management Office What Happens When Two Federations Want to Interoperate?  Enable technical interoperability between members of different federations  Develop mutually agreed-upon mappings for trusting identity credentials and elements of credentials  Develop mutually agreed-upon mappings for business rules  Develop peer-based conflict resolution mechanisms

10 10 The E-Authentication Initiative E-Gov Program Management Office Report: Status of Interfederation Interoperability Work Group  inCommon Higher Education Identity Federation Using Shibboleth middleware technical protocols Policy-light  E-Authentication US Identity Federation Using a variety of technical protocols Policy intensive

11 11 The E-Authentication Initiative E-Gov Program Management Office Accomplishments to Date  Demonstration of proof of concept for technical interoperability of identity credentials and utilities: E-Authentication SAML 1.0 and Shibboleth 1.2  Production-level interoperability built into Shibboleth 1.3 (in beta)  Extensive groundwork done on identifying policy and procedure mapping/treaty requirements  Credential Assessment of 4 Universities

12 12 The E-Authentication Initiative E-Gov Program Management Office Work in Progress  Development of common SAML 2.0 schemes  Development of common USPerson profile and profile management infrastructure  Development of production-quality scheme translator  Ongoing work to enable cross-federation trust and interoperability  NSF FastLane to accept 4 universities’ Shibboleth-based identity and attribute credentials

13 13 The E-Authentication Initiative E-Gov Program Management Office Unresolved Issues  Mapping null attributes  Ensuring privacy of attribute information in a variety of instances  Portal integration  Scaling issues for listing credential providers  Issues of transitivity across federations  Multiple authoritative sources/conflicting authoritative sources  Vocabulary and “data dictionary” issues  Liability and indemnification issues

14 14 The E-Authentication Initiative E-Gov Program Management Office More Information  peter.alterman@nih.gov peter.alterman@nih.gov  http://csrc.nist.gov http://csrc.nist.gov  http://www.cio.gov/fbca http://www.cio.gov/fbca  http://www.cio.gov/eauthentication http://www.cio.gov/eauthentication  http://www.cio.gov/fpkipa http://www.cio.gov/fpkipa


Download ppt "The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication."

Similar presentations


Ads by Google