The E-Authentication Initiative

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

Final Report Manitoba First Nations (MFNs)Patient Wait Times Guarantee Pilot Project Process Mapping Workshops.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
Certificate Interoperability S&I Framework Initiative Final Report August 17, 2011.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
The Accessibility for Ontarians with Disabilities Act June 2012 Keith Hambly Executive Director, Fife House Foundation.
U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
U.S. Department of Agriculture eGovernment Program December 3, 2003 eAuthentication Initiative USDA eAuthentication Service Overview eGovernment Program.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
E-RA E-Authentication Risk and Requirements Assessment Mark Liegey USDA/National Finance Center “Getting to Green with E-Authentication” February 3, 2004.
Shibboleth: An Introduction
Master Recreation Plan Program-Level Management Plan  What is a Program Management Plan?  How is it developed?  What’s next?
Shibboleth Update Eleventh Federal & Higher Education PKI Coordination Meeting (Fed/Ed Thursday, June 16, 2005.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 Beyond Content Packaging: LETSI’s Open Learning Architecture Avron Barr letsi.org LETSI is an international non-profit federation committed to open standards.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
E-Authentication briefing for 11th Fed/Ed PKI Meeting Thursday June 16th, 2005.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
Francesca Entwistle Regional Infant Feeding Co-ordinator DH London L Dyson, F McCormick, Professor MJ Renfrew.
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.
Getting Prepared October 2016 District Meetings
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Briefing on the oversight role of the DPW over IDT
Measuring Outputs, Preparing for Outcomes
NSW Vision and Delivery NSW Department of Planning & Environment
Privacy, Security, and Identity Management Update
Inventory of Standards Inventories
Boating Safety Dashboard - How your state can participate
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
Arizona Health-e Connection Leadership from Governor Napolitano
U.S. Federal e-Authentication Initiative
Proposal to Create IAM Working Group
NAAS 2.0 Features and Enhancements
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Professional Services at FAS June 9, 2014
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Technical Approach Chris Louden Enspier
The E-Authentication Initiative
What ACS Can Do For Me?.
Bringing technology and leadership together.
NSW Vision and Delivery NSW Department of Planning & Environment
October 11, 2018 Industry-Recognized Apprenticeship Programs: A New Approach to a Proven Model.
Transportation policy
Global Authentication: Liberty Alliance Identity Assurance Framework
Health Information Technology: Is Medicaid Keeping Pace?
Appropriate Access InCommon Identity Assurance Profiles
Caleb Baker Sr. Program Manager
Procedure for adding a Trusted Site
4th Annual Conference on Technology and Standards Washington
Alliance for Telecommunications Industry Solutions (ATIS) Update
OFFICIAL Data Analytics and AI Centre of Expertise 17th September 2019.
Presentation transcript:

The E-Authentication Initiative Executive Briefing Wrap-up Steve Timchak, GSA E-Authentication Program Manager “Getting to Green with E-Authentication” February 3, 2004 Executive Session

Policy Management Credentials Technology Applications The E-Authentication Initiative E-Authentication: The Service Components Policy Administration & Management Credentials Technology Applications 2

The ground-rules are defined: The E-Authentication Initiative E-Authentication: Where we stand Policy The ground-rules are defined: E-Authentication Guidance for Federal Agencies released Draft NIST Recommendation for Electronic Authentication available for public comment Federal Identity Credentialing Policy on schedule for June delivery 3

Tools are in place: Administration & Management The E-Authentication Initiative Administration & Management E-Authentication: Where we stand Tools are in place: Adding to our team to ensure we can deliver the authentication expertise agencies need Financial modeling underway to determine the best way to deliver services that represent real savings to agencies 4

You’re the reason we’re here: The E-Authentication Initiative E-Authentication: Where we stand You’re the reason we’re here: e-RA available online for all Initiatives to use Application Managers in place to deliver E-Authentication services to agencies Pilot application procedure in development to present opportunities to align with E-Authentication – and get funding! Applications 5

Federation is the way: E-Authentication: Where we stand The E-Authentication Initiative E-Authentication: Where we stand Federation is the way: Using SAML 1.0 today Adaptable as other standards -- Liberty Alliance, WS* -- mature Interoperability Lab will test products for inclusion on approved technology providers list As the list of approved providers grows, so do agencies’ options! Technology 6

The key that turns the ignition: The E-Authentication Initiative E-Authentication: Where we stand The key that turns the ignition: Ability to use of existing 3rd party credentials is the goal CAF is in place and being used to vet CSPs against relevant guidance Initial list of trusted CSPs (E-Authentication Trust List) is available on E-Auth Web site Credentials 7

E-Authentication Needs You! The E-Authentication Initiative E-Authentication Needs You! 8