EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.

Slides:



Advertisements
Similar presentations
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
Ongoing Efforts to Build The US Federal PKI Bridge
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
US E-authentication and the Culture of Compliance RL “Bob” Morgan University of Washington CAMP, June 2005.
Federal Electronic Identity Initiatives – Current Status Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO for E-Authentication,
Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
NIH iTrust Peter Alterman/Debbie Bucci National Institutes of Health October 2010.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
The U.S. Federal PKI, 2004: Report to EDUCAUSE Peter Alterman, Ph.D. Assistant CIO for E-Authentication National Institutes of Health.
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
Joining the Federal Federation: a Campus Perspective Institute for Computer Policy and Law June 29, 2005 Andrea Beesing IT Security Office.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
NSTIC ID Ecosystem A Conceptual Model v03 Andrew Hughes October October IDESG Version 1.
The InCommon Federation The U.S. Access and Identity Management Federation
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
(Inter)Federation as Identity Management Policy Driver? RL "Bob" Morgan University of Washington.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Federal e-Authentication Initiative: Federated Identity and Interoperability David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Government-University Identity Management Opportunities Peter Alterman, Ph.D. Chair, U.S. Federal PKI Policy Authority and Assistant CIO/E-Authentication,
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
Shibboleth Update Eleventh Federal & Higher Education PKI Coordination Meeting (Fed/Ed Thursday, June 16, 2005.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Status Update on Other GFIPM Activity Threads GFIPM Delivery Team Meeting November 2011.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Federal PKI Update Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Federal PKI Update Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
National Institutes of Health Interfederation Initiatives Peter Alterman, Ph.D. Assistant CIO for e-Authentication.
E-Authentication briefing for 11th Fed/Ed PKI Meeting Thursday June 16th, 2005.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
Interfederation: From Demo to Eternity RL “Bob” Morgan, University of Washington and Internet2 Internet2 Member Meeting, Chicago December, 2006.
Federal Identity Management Overview and Current Status Dr. Peter Alterman, Chair Federal PKI Policy Authority.
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Tech Day VI SECURITY POLICIES AND PROCEDURES PANEL DISCUSSION Joint DSIC, TBPT, CTMS Meeting Natcher Building, National Institutes of Health (NIH) 45 Center.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
LoA In Electronic Identity Jasig Dallas Levels of Assurance In Electronic Identity Considerations for Implementation Benjamin Oshrin Rutgers University.
Privacy, Security, and Identity Management Update
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Technical Approach Chris Louden Enspier
Federal Requirements for Credential Assessments
HIMSS National Conference New Orleans Convention Center
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

eAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005

eAuthentication Background HSPD-12 ● Mandates of federal agencies to issue ID credentials using FIPS-201 identity proofing procedures beginning October 2005 ● Mandates all federal agencies begin issuing SmartCards with Medium assurance digital certs by October 2006

eAuthentication Program ● Provide a single source of identity authentication for federal agency applications – NSF’s FastLane grant application and communication package ● To develop and promulgate policies and procedures to sustain a common identity federation for the federal government in support of eGov ● Burton Group report

Summary of eAuthentication Approach Four levels of assurance (LOA)  LOA 1 and 2 are assertion-based – such as userid/password, SAML, Shibboleth  LOA 3 and 4 are cryptographically-based – such as PKI  LOA level required to be based on Risk Assessment

Summary of eAuthentication Approach Agency Applications Agency Applications (resource provider) determine their own authorization requirements Rely on credentials issued by external Credential Service Providers who submit to an assessment based on a Credential Assessment Framework – CAF’ing

Credential Assessment Framework Create a federated circle of trust A structured methodology and procedure for evaluating the LOA of a Credential Service Provider’s (CSP) credentials An assessment team visits and evaluates the CSP A process for conflict resolution established

Federation Interoperability Interfederation Interoperability Work Group InCommon Use Shibboleth middleware technical protocols “Policy” light E-Authentication US Identity Federation Use a variety of technical protocols Policy intensive

Federation Interoperability Proof of Concept Technical interoperability of identity credentials and utilities has been demonstrated Production level interoperability is built into Shibboleth 1.3 beta Credential assessment of 4 Universities

Resources E-Authentication home NIST E-Authentication Credential Assessment Suite Credential Assessment Framework